[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 21 Jan 2019 04:31:09 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/01/21 04:31:09
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.360&r2=1.361
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.452&r2=1.453
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.14&r2=1.15
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- de.po 19 Jan 2019 09:30:11 -0000 1.14
+++ de.po 21 Jan 2019 09:31:03 -0000 1.15
@@ -10038,6 +10038,13 @@
msgid "Latest additions"
msgstr "Letzte Ergänzungen"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- es.po 19 Jan 2019 12:30:54 -0000 1.17
+++ es.po 21 Jan 2019 09:31:05 -0000 1.18
@@ -7185,6 +7185,13 @@
msgid "Latest additions"
msgstr "Añadidos recientes"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- fr.po 19 Jan 2019 09:30:12 -0000 1.24
+++ fr.po 21 Jan 2019 09:31:05 -0000 1.25
@@ -7986,6 +7986,13 @@
msgid "Latest additions"
msgstr "Ajouts récents"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><p>
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- it.po 19 Jan 2019 09:30:12 -0000 1.14
+++ it.po 21 Jan 2019 09:31:05 -0000 1.15
@@ -9328,6 +9328,13 @@
msgid "Latest additions"
msgstr "Ultime aggiunte"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- ja.po 19 Jan 2019 09:30:12 -0000 1.14
+++ ja.po 21 Jan 2019 09:31:05 -0000 1.15
@@ -7893,6 +7893,13 @@
msgid "Latest additions"
msgstr "ææ°ã®è¿½å "
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- nl.po 19 Jan 2019 09:30:12 -0000 1.14
+++ nl.po 21 Jan 2019 09:31:05 -0000 1.15
@@ -6345,6 +6345,13 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- pl.po 19 Jan 2019 09:30:12 -0000 1.14
+++ pl.po 21 Jan 2019 09:31:05 -0000 1.15
@@ -5884,6 +5884,13 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- pot 19 Jan 2019 09:30:12 -0000 1.14
+++ pot 21 Jan 2019 09:31:05 -0000 1.15
@@ -5381,6 +5381,13 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><p>
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-surveillance.de-diff.html 17 Jan 2019 06:30:31 -0000
1.34
+++ proprietary-surveillance.de-diff.html 21 Jan 2019 09:31:05 -0000
1.35
@@ -661,124 +661,83 @@
requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display
- ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p>
</li>
<li id="M201709210">
- <p>In</em></ins></span> the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>latest iThings system,
- “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed that the non-premium version of</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way
really</em></ins></span> does
- <span class="removed"><del><strong>JavaScript
injection</strong></del></span> <span class="inserted"><ins><em>turn
- them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>tracking and display ads.</dd>
- </dl></strong></del></span> <span
class="inserted"><ins><em>you—“We
- know you want to be spied on”.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact</strong></del></span>
+ doesn't really turn them off</a>. A more advanced way really does
turn
+ them off—only until 5am. That's Apple for you—“We
+ know you want to be spied on”.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201702150">
- <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <li id="M201702150">
+ <p>Apple proposes <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word</strong></del></span> <span
class="inserted"><ins><em>phone</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>snooping on them.</p></em></ins></span>
+ no way</em></ins></span> to <span class="inserted"><ins><em>tell
whether</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span class="inserted"><ins><em>phone is snooping
on them.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big
Brother</em></ins></span> can <span class="removed"><del><strong>only hope that
they don't.</p></strong></del></span> <span class="inserted"><ins><em>get
- them from there.</p></em></ins></span>
+ <li id="M201611170">
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots</em></ins></span> of <span class="inserted"><ins><em>personal data to
Apple's servers</a>. Big Brother can get
+ them from there.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509240">
- <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed
in</strong></del></span> <span class="inserted"><ins><em>Apple's servers all
the photos
+ <li id="M201509240">
+ <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>JS
injection</strong></del></span> <span class="inserted"><ins><em>photos
and videos they make.</p>
- <blockquote><p> iCloud Photo Library</em></ins></span> stores
<span class="removed"><del><strong>or played</strong></del></span> <span
class="inserted"><ins><em>every photo and video you
+ <blockquote><p> iCloud Photo Library stores every photo and
video you
take, and keeps them up to date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a
href="https://support.apple.com/en-us/HT202033">activated</em></ins></span>
by <span class="removed"><del><strong>TV programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs</strong></del></span> <span class="inserted"><ins><em>the
- startup</em></ins></span> of <span class="removed"><del><strong>Android
apps can collude</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
- <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>transmit users' personal
- data</strong></del></span>
+ <p>There</em></ins></span> is <span class="inserted"><ins><em>a
way</em></ins></span> to <span class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so it still counts as a
+ iCloud</a>, but it's active by default so</em></ins></span> it <span
class="removed"><del><strong>redirects the
+ user's traffic</strong></del></span> <span
class="inserted"><ins><em>still counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage of
this</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>many celebrities</a>. They needed to break
Apple's
- security to get at them, but NSA can access any</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201409220">
- <p>Apple can, and regularly does,</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that install the app</a>.</p>
-
-<p>Merely asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>“consent” of users
is</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ <p>Unknown people apparently took advantage of this to <a
+
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any of them</em></ins></span>
through <span class="removed"><del><strong>valueclick.com (an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript</strong></del></span> <span
class="inserted"><ins><em><a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ </li>
+
+ <li id="M201409220">
+ <p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.</p>
<p>This may have improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but <a
-
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
- not <span class="removed"><del><strong>enough</strong></del></span> <span
class="inserted"><ins><em>as much as Apple claims</a>.</p>
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <span class="removed"><del><strong>“Terms and
Conditions” that spell out
-what they are “consenting” to. Google should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em><a
+ Several “features” of iOS seem to exist
+ for no possible purpose other than surveillance</a>. Here is the
<a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
@@ -786,14 +745,14 @@
<li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>information it
collects</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+ iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all the data in an iThing, or it
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
is totally incompetent</a>.</p>
</li>
@@ -805,20 +764,17 @@
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
+ <p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
- still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
+ enabled by default</a>. (That article talks about iOS 6, but it is
+ still true in iOS 7.)</p>
</li>
<li id="M201204280">
- <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
- email address</em></ins></span> and <span
class="removed"><del><strong>other companies</strong></del></span> <span
class="inserted"><ins><em>receiving the verification code Apple sends
+ <p>Users cannot make an Apple ID (<a
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
+ to install even gratis apps</a>) without giving a valid
+ email address and receiving the verification</em></ins></span> code <span
class="removed"><del><strong>into HTML pages,</strong></del></span> <span
class="inserted"><ins><em>Apple sends
to it.</p>
</li>
</ul>
@@ -833,9 +789,8 @@
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>getting this personal information
in</strong></del></span> <span class="inserted"><ins><em>Android
phones</a> while disguising
- what</em></ins></span> the <span class="removed"><del><strong>first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
+ upload call logs automatically from Android phones</a> while
disguising
+ what the “consent” was for.</p>
</li>
<li id="M201711210">
@@ -848,12 +803,10 @@
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></em></ins></span>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609140"></em></ins></span>
+ <li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
@@ -865,129 +818,103 @@
unthinkable with free software.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location information</a>
of</strong></del></span> <span class="inserted"><ins><em>they send so much data
that</em></ins></span> their <span class="removed"><del><strong>users with
third parties.</p>
+ <li id="M201507030">
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed</strong></del></span> <span class="inserted"><ins><em>they
send so much data</em></ins></span> that <span class="inserted"><ins><em>their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by</em></ins></span> the <span
class="removed"><del><strong>non-premium version</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
+ of <span class="removed"><del><strong>the app does
+ JavaScript injection for tracking and display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>some
kind.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120"></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+ proprietary</strong></del></span> <span
class="inserted"><ins><em>system.</p>
</li>
- <li><p>“Cryptic communication,” unrelated to the
app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way to say
- “zero price”</strong></del></span>
- <span class="inserted"><ins><em>transmission</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>a substantial expense</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> <span
class="inserted"><ins><em>users. Said transmission,
- not wanted or requested by</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>user, clearly must
constitute spying
- of some kind.</p>
- </li>
-
- <li id="M201403120">
- <p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
- just as wrong as</strong></del></span> any <span
class="removed"><del><strong>other snooping.</p></strong></del></span>
<span class="inserted"><ins><em>file on the system.</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308010">
- <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100</strong></del></span> <span
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in
Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is present in some Android devices when
they are
- sold. Some Motorola <span class="removed"><del><strong>phones
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when
this company was owned
- by Google, use a modified version of</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- <span class="removed"><del><strong>send</strong></del></span>
- <span class="inserted"><ins><em>sends</em></ins></span> personal data to
Motorola</a>.</p>
- </li>
+ <li id="M201308010">
+ <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps contained recognizable tracking libraries.
For
+ the paid proprietary apps, it was only 60%.</p>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+ <p>The</strong></del></span> <span class="inserted"><ins><em>phones
(and Windows? laptops): The Wall Street
+ Journal (in an</em></ins></span> article <span
class="removed"><del><strong>confusingly describes gratis apps as
“free”,
+ but most of them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always</strong></del></span>
<span class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="removed"><del><strong>will fit
+ perfectly.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
+<li>
+ <p>Apps for BART</strong></del></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</em></ins></span> can <span class="removed"><del><strong>only hope
that they don't.</p>
+</li>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
+<li>
+ <p>A study found 234</strong></del></span> <span
class="inserted"><ins><em>remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps that track
users by</strong></del></span> <span class="inserted"><ins><em>phones
+ and laptops</a>. (I suspect this means Windows laptops.) Here
is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+ <li id="M201307280">
+ <p>Spyware is present</em></ins></span> in <span
class="removed"><del><strong>stores or played</strong></del></span> <span
class="inserted"><ins><em>some Android devices when they are
+ sold. Some Motorola phones, made when this company was
owned</em></ins></span>
+ by <span class="removed"><del><strong>TV programs</a>.
+ </p>
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
+</li>
+<li>
+ <p>Pairs</strong></del></span> <span class="inserted"><ins><em>Google,
use a modified version</em></ins></span> of Android <span
class="removed"><del><strong>apps can collude to transmit
users'</strong></del></span> <span class="inserted"><ins><em>that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends</em></ins></span> personal data to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ </li>
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
+ <li id="M201307250">
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p></em></ins></span>
+ </li>
-<ul>
- <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ <span class="inserted"><ins><em><li id="M201302150"></em></ins></span>
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this.
At</em></ins></span> this
- <span class="removed"><del><strong>would require
circumventing</strong></del></span> <span class="inserted"><ins><em>point, most
users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p>
- </li>
-
- <li><p>In</strong></del></span> <span
class="inserted"><ins><em>“Terms and Conditions” that spell out what
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>information it
collects on users, instead of
+ honestly identify the information it collects on <span
class="removed"><del><strong>users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em>users,
instead of
hiding it in an obscurely worded EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent
Google</em></ins></span>
- and <span class="removed"><del><strong>Bluetooth</strong></del></span>
<span class="inserted"><ins><em>other companies from getting this personal
information in</em></ins></span> the
- <span class="removed"><del><strong>obvious way</strong></del></span>
- <span class="inserted"><ins><em>first place!</p>
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
<li id="M201111170">
- <p>Some manufacturers add a</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ <p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -997,37 +924,25 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is
snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
<li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</em></ins></span> lots of <span
class="removed"><del><strong>personal</strong></del></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p></em></ins></span>
+ the e-reader used by most US libraries, <a
+
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the user <span
class="removed"><del><strong>types into it</a>; the server records these
numbers for</strong></del></span> <span
class="inserted"><ins><em>reads</em></ins></span> at <span
class="removed"><del><strong>least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>what time</a>.</p></em></ins></span>
+ <li id="M201212030">
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -1044,217 +959,338 @@
<ul class="blurbs">
<li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
- without giving</strong></del></span> <span class="inserted"><ins><em>the
company's server</a>. The company is
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The company is
being sued, demanding that it notify the users of what it will do
with the data.</p>
- <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>valid email address and
receiving</strong></del></span> <span class="inserted"><ins><em>side issue.
What</em></ins></span> the <span class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>company does
+ <p>I think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ tracking people's locations.</p>
</li>
- <span class="removed"><del><strong><li><p>Around 47%
of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
+ <li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the <span class="removed"><del><strong>most
popular iOS</strong></del></span> <span class="inserted"><ins><em>phones of
users that have deleted them</a>.</p>
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google</em></ins></span> apps <span
class="inserted"><ins><em>on Android</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's</em></ins></span> location <span
class="removed"><del><strong>information</a></strong></del></span> <span
class="inserted"><ins><em>even when users disable “location
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other
kinds</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>location
- tracking, but most</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>will
be tricked by the misleading control.</p></em></ins></span>
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
+and</strong></del></span> <span class="inserted"><ins><em>turn off
the</em></ins></span> other <span class="removed"><del><strong>companies from
getting this personal information in</strong></del></span> <span
class="inserted"><ins><em>kinds of location
+ tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>misleading control.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android)</strong></del></span>
<span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>user's
movements</em></ins></span> and <span
class="removed"><del><strong>keeps</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
-
- <p>This makes</em></ins></span> them <span
class="removed"><del><strong>up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a></strong></del></span> <span
class="inserted"><ins><em>act</em></ins></span> as <span
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span class="inserted"><ins><em>spies
for licensing enforcement.</p>
-
- <p>I expect it implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>no</em></ins></span> way to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
- a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>recording. But I
can't be sure from the article.</p>
-
- <p>If you learn</em></ins></span> to <span
class="inserted"><ins><em>care much less about sports, you will benefit in
- many ways. This is one more.</p>
- </li>
-
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>the 5,855 Android
apps studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40% of the apps were
+ <p>The Spanish football streaming app</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>users'</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps</strong></del></span> and <span
class="removed"><del><strong>location tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that
there</em></ins></span> is
+ <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>no
way</em></ins></span> to <span class="removed"><del><strong>obey the user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
+ a <span class="removed"><del><strong>thing would</strong></del></span>
<span class="inserted"><ins><em>recording. But I can't</em></ins></span> be
<span class="removed"><del><strong>almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>sure from the article.</p>
+
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>More</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More</em></ins></span> than <span
class="removed"><del><strong>73%</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
+ of the <span class="removed"><del><strong>most
popular</strong></del></span> <span
class="inserted"><ins><em>5,855</em></ins></span> Android apps
+ <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>studied by
researchers were found to snoop</em></ins></span>
+ and <span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+ detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to get <span class="removed"><del><strong>at them,
but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>rid</em></ins></span> of <span
class="removed"><del><strong>them through</strong></del></span> <span
class="inserted"><ins><em>the proprietary software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+ their users. To protect</em></ins></span> their <span
class="inserted"><ins><em>privacy and freedom, Android</em></ins></span> users
<span class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span>
+ <span class="inserted"><ins><em>need</em></ins></span> to <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
+ and</em></ins></span> the <span class="removed"><del><strong>500 most
popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these</strong></del></span>
<span class="inserted"><ins><em>proprietary</em></ins></span> apps <span
class="removed"><del><strong>as
+ “free”—they are not</strong></del></span> <span
class="inserted"><ins><em>by getting apps from the</em></ins></span> free <span
class="removed"><del><strong>software. The clear way to say
+ “zero price” is “gratis.”</p>
- <li><p>Spyware in iThings:</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>software
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="inserted"><ins><em><a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="inserted"><ins><em>user if an app contains
anti-features</a>.</p>
+ the <span class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what</strong></del></span> <span class="inserted"><ins><em>user if
an app contains anti-features</a>.</p>
</li>
<li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>iThing is,
- and get other</strong></del></span> <span
class="inserted"><ins><em>information to
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which</em></ins></span> users are <span class="removed"><del><strong>doing
or how. “Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such</em></ins></span> info
<span class="removed"><del><strong>too.</p></strong></del></span> <span
class="inserted"><ins><em>to each
- other but not to the server's database.</p></em></ins></span>
+ It could be designed so</em></ins></span> that <span
class="removed"><del><strong>snoop are
+ just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>users communicate such info to each</em></ins></span>
+ other <span class="removed"><del><strong>snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but</strong></del></span> <span
class="inserted"><ins><em>but</em></ins></span> not <span
class="removed"><del><strong><a href="/philosophy/free-sw.html">free
software</a>)
+ connect</strong></del></span> to <span class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>the server's database.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
+ <li id="M201803050">
+ <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
<span class="inserted"><ins><em>dis-service
+ spy</em></ins></span> on <span class="removed"><del><strong>the
average.</p></strong></del></span> <span class="inserted"><ins><em>users
even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>track users, which</strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p>
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware is
present</strong></del></span>
- <li id="M201711240">
- <p>Tracking software in popular Android apps</em></ins></span>
- is <span class="inserted"><ins><em>pervasive and sometimes very clever.
Some trackers can</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201711240">
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>popular</em></ins></span> Android <span
class="removed"><del><strong>devices when they are sold.</strong></del></span>
<span class="inserted"><ins><em>apps
+ is pervasive and sometimes very clever.</em></ins></span> Some <span
class="removed"><del><strong>Motorola phones modify Android
to</strong></del></span> <span class="inserted"><ins><em>trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store</em></ins></span> by
<span class="removed"><del><strong>default</a>.
(That</strong></del></span> <span class="inserted"><ins><em>noticing WiFi
- networks</a>.</p>
+ follow</em></ins></span> a
+ <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store by noticing WiFi
+ networks</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
- <li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708270">
+ <p>The Sarahah app</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this</em></ins></span> article
<span class="removed"><del><strong>talks about iOS 6, but</strong></del></span>
<span class="inserted"><ins><em>misuses the words
+ book</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that</em></ins></span> this
+ <span class="removed"><del><strong>would require
circumventing</strong></del></span> <span class="inserted"><ins><em>article
misuses</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ referring to zero price.</p></em></ins></span>
</li>
- <li id="M201707270">
- <p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
+ <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth the
+ obvious way</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201707270">
+ <p>20 dishonest Android apps recorded</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent</em></ins></span> them <span
class="removed"><del><strong>off—only until 5am.
+ That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>and text messages and emails</em></ins></span>
to <span class="removed"><del><strong>be spied on”.</p>
+ </li>
- <p>Google did not intend to make these apps spy; on the
contrary,</em></ins></span> it
- <span class="inserted"><ins><em>worked in various ways to prevent that,
and deleted these apps after
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did not intend</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>make these apps spy; on the
contrary,</em></ins></span> it <span class="removed"><del><strong>without
having your fingerprints
+ taken. Users would have no way</strong></del></span>
+ <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the <span class="removed"><del><strong>phone
is</strong></del></span> snooping <span class="removed"><del><strong>on
+ them.</p></li>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>these apps.</p>
+
+ <p>On</em></ins></span> the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>other hand, Google redistributes nonfree Android
apps, and
+ therefore shares in</em></ins></span> the <span
class="removed"><del><strong>server records these numbers</strong></del></span>
<span class="inserted"><ins><em>responsibility</em></ins></span> for <span
class="removed"><del><strong>at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
- cheating? There</em></ins></span> is <span
class="removed"><del><strong>still true</strong></del></span> <span
class="inserted"><ins><em>no systematic way for Google, or Android users,
+ <p>Could Google have done</em></ins></span> a <span
class="removed"><del><strong>valid email address</strong></del></span> <span
class="inserted"><ins><em>better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat
users</em></ins></span> in <span class="removed"><del><strong>iOS
7.)</p></strong></del></span>
- <span class="inserted"><ins><em>various ways. If it did a good job of
this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
+ <p>Google could demand the source code for these
apps,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span>
+ the <span class="inserted"><ins><em>source</em></ins></span> code <span
class="removed"><del><strong>Apple
+ sends</strong></del></span> <span
class="inserted"><ins><em>somehow</em></ins></span> to <span
class="removed"><del><strong>it.</p>
+ </li>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p></em></ins></span>
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
+ various ways. If it did a good job</em></ins></span> of <span
class="inserted"><ins><em>this, it could more or less
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
+ enough</em></ins></span> to <span class="removed"><del><strong>Apple's
servers all</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>photos and
+ videos they make.</p>
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span>
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google</em></ins></span> to <span class="removed"><del><strong>date on all
your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup</strong></del></span> <span class="inserted"><ins><em>protect
us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by
default</strong></del></span> <span class="inserted"><ins><em>the
+ public,</em></ins></span> so <span class="removed"><del><strong>it still
counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this
to</strong></del></span> <span class="inserted"><ins><em>we can depend on each
other.</p>
+ </li>
+
+ <li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>only hope that they don't.</p></em></ins></span>
+ <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>access any of them through</strong></del></span>
<span class="inserted"><ins><em>only hope that they don't.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data</strong></del></span>
+ <li><p>Spyware</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound</em></ins></span> from <span
class="removed"><del><strong>iPhones for the state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data</strong></del></span>
<span class="inserted"><ins><em>beacons placed</em></ins></span> in <span
class="removed"><del><strong>an iThing,</strong></del></span> <span
class="inserted"><ins><em>stores</em></ins></span> or <span
class="removed"><del><strong>it is totally
incompetent.</a></p></strong></del></span> <span
class="inserted"><ins><em>played by TV
+ to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>iThings:
+ the <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets</strong></del></span> stores <span
class="removed"><del><strong>determine exactly where the iThing is,
+ and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>or played by TV
programs</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
<span class="inserted"><ins><em><li id="M201704260">
- <p>Faceapp appears to do lots</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>surveillance, judging by <a
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</em></ins></span> to <span
class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>personal data
in</em></ins></span> the
+ how much access</em></ins></span> it
+ <span class="removed"><del><strong>is still true</strong></del></span>
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in
<span class="removed"><del><strong>iOS 7.)</p></strong></del></span>
<span class="inserted"><ins><em>the
device</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for</em></ins></span> its <span
class="removed"><del><strong>geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>this was done without</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>users' consent.
+ If</em></ins></span> the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>fine print
of</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>app said that
users gave consent for this,
+ would that make</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
+ the
<span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app to snoop at
all</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1265,113 +1301,98 @@
</div>
<ul>
- <li><p>Tracking software in popular Android apps is pervasive and
- sometimes very clever. Some trackers can</strong></del></span>
+ <li><p>Tracking software in popular</strong></del></span>
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201704074">
+ <p>Pairs of</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
+ sometimes very clever. Some trackers</strong></del></span> can <span
class="inserted"><ins><em>collude
+ to transmit users' personal data to servers.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span
class="removed"><del><strong>physical store by noticing WiFi
- networks</a>.</p>
-</li>
-
- <li><p>Android tracks location</strong></del></span> <span
class="inserted"><ins><em>spyware app</em></ins></span> for <span
class="removed"><del><strong>Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when</strong></del></span> <span class="inserted"><ins><em>its
headphones</a>. Specifically,</em></ins></span>
- the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>app would record the names of the audio files users
listen to
- along with the headphone's unique serial number.</p>
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study found tens of thousands of pairs that
collude</a>.</p></em></ins></span>
+ </li>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>design
- the app</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,
- <a
href="http://www.bbc.com/news/uk-34444233">agencies</strong></del></span>
<span class="inserted"><ins><em>snoop at all</a>.</p>
- </li>
-
- <li id="M201704074">
- <p>Pairs of Android apps</em></ins></span> can <span
class="removed"><del><strong>take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>collude</em></ins></span>
- to <span class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data to servers. <a
-
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens of thousands of pairs that collude</a>.</p>
- </li>
-
- <li id="M201703300">
- <p>Verizon <a
-
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703300">
+ <p>Verizon</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off,
even</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>same information
- about the users' searches that Google normally gets when they use
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets</em></ins></span> when
<span class="inserted"><ins><em>they use
its search engine.</p>
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="inserted"><ins><em>only one phone</a>,</em></ins></span> and <span
class="removed"><del><strong>off, listen to</strong></del></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>user must
- explicitly opt-in before</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the
<span class="removed"><del><strong>contact list. This
malware</strong></del></span> <span class="inserted"><ins><em>app
- remains spyware—an “optional” piece of
spyware</em></ins></span> is <span class="removed"><del><strong>designed to
- disguise itself from investigation.</p></strong></del></span>
- <span class="inserted"><ins><em>still spyware.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+ <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
- <span class="inserted"><ins><em><li id="M201701210">
- <p>The Meitu photo-editing app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</em></ins></span> data <span class="removed"><del><strong>that their
transmission is</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span> a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
- requested by the user, clearly must constitute spying of some
- kind.</p></li>
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="inserted"><ins><em>spyware is
+ still spyware.</p>
+ </li>
+
+ <li id="M201701210">
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>Chinese company</a>.</p>
+ <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span>
+ <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to turn the phones
+ on</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by</strong></del></span>
<span class="inserted"><ins><em>ride</a>.</p>
+ movements before</em></ins></span> and <span
class="removed"><del><strong>off, listen to the microphone, retrieve
geo-location data from</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
- <p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate as</em></ins></span> a <span
class="removed"><del><strong>paywall)
- reports that</strong></del></span> <span
class="inserted"><ins><em>protection against
- massive surveillance.</p>
+ <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>contact list. This
malware</strong></del></span> <span class="inserted"><ins><em>user's
+ consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>inadequate as a protection against
+ massive surveillance.</p></em></ins></span>
</li>
- <li id="M201611160">
- <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate</strong></del></span>
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611160">
+ <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
<span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>privacy</em></ins></span> and <span
class="removed"><del><strong>microphone in</strong></del></span> <span
class="inserted"><ins><em>security of
- 283</em></ins></span> Android
- <span class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>VPN apps concluded that “in spite of the
promises
- for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>anonymity given by the majority of VPN
+ research paper</a></em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span
class="inserted"><ins><em>investigated the privacy</em></ins></span> and <span
class="removed"><del><strong>they send so much data</strong></del></span> <span
class="inserted"><ins><em>security of
+ 283 Android VPN apps concluded</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>“in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following</em></ins></span> is
- <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ <p>Following</em></ins></span> is a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
+ requested by</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the
<span class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>research
paper,</em></ins></span>
+ of some
+ <span class="removed"><del><strong>kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
+ </li>
+
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by a paywall)
+ reports</strong></del></span> <span
class="inserted"><ins><em>proprietary VPN apps</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>track
users</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is
+ <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li><p>Portable phones with GPS will send</strong></del></span>
<span class="inserted"><ins><em>a non-exhaustive list, taken from the research
paper,
- of some proprietary VPN apps that track users and
infringe</em></ins></span> their <span class="removed"><del><strong>GPS
location on
+ <li><p>Portable phones with GPS will send</strong></del></span>
<span class="inserted"><ins><em>infringe</em></ins></span> their <span
class="removed"><del><strong>GPS location on
remote command</strong></del></span>
<span class="inserted"><ins><em>privacy:</p>
@@ -1385,11 +1406,11 @@
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>has full access to
users'
+ permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>has full
access</em></ins></span> to <span class="inserted"><ins><em>users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</em></ins></span> to <span class="inserted"><ins><em>read logs
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
for other apps and also core system logs. TigerVPN
developers</em></ins></span> have <span
class="removed"><del><strong>GPS.)</p>
</li>
@@ -1562,13 +1583,13 @@
</li>
<li id="M201510300">
- <p>More than 73%</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ <p>More than 73% and 47% of mobile applications, from
Android</em></ins></span> and <span
class="removed"><del><strong>face-recognition
algorithms.</p>
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>47%</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if the user didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>mobile
applications, from Android and iOS
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>iOS
respectively <a href="https://techscience.org/a/2015103001/">share
- personal, behavioral and location information</a> of their users with
+ personal, behavioral and location information</a></em></ins></span>
of <span class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if the user didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>their
users with
third parties.</p></em></ins></span>
</li>
@@ -1736,16 +1757,15 @@
their products, rather than free software which users could have
checked and changed.</p>
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>made the vibrator</strong></del></span>
+ <span class="inserted"><ins><em>is found in many proprietary games.
It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how
people used it</a>.</p>
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold
the</strong></del></span>
- <span class="inserted"><ins><em>is found in many proprietary games. It
<a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks</em></ins></span> data <span class="inserted"><ins><em>on users'
computers and sends it</em></ins></span> to <span
class="inserted"><ins><em>third parties</a>.</p>
+ <p>The company's statement that it was anonymizing
the</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks</em></ins></span> data <span class="removed"><del><strong>may be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>on users' computers and sends</em></ins></span> it
<span class="removed"><del><strong>had sold the data</strong></del></span> to
<span class="inserted"><ins><em>third parties</a>.</p>
</li>
<li id="M201804144">
@@ -1793,13 +1813,17 @@
was unacceptable</strong></del></span> <span
class="inserted"><ins><em>sites made</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
<li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>different
+ companies.</p>
+
+ <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>spy on children</strong></del></span> <span
class="inserted"><ins><em>manipulate people to buy things,</em></ins></span>
and <span class="removed"><del><strong>adults</a>.</p>
</li>
</ul>
<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>hunt for
+ “whales” who can be led</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
@@ -1810,61 +1834,84 @@
<ul>
<li>
- <p>An LG “smart” watch is designed
- <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
<span class="inserted"><ins><em>different
- companies.</p>
+ <p>An LG “smart” watch is designed</strong></del></span>
<span class="inserted"><ins><em>spend a lot of money. They also
+ use a back door to manipulate the game play for specific players.</p>
- <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>report its location</strong></del></span> <span
class="inserted"><ins><em>manipulate people</em></ins></span> to <span
class="removed"><del><strong>someone else</strong></del></span> <span
class="inserted"><ins><em>buy things,</em></ins></span> and <span
class="inserted"><ins><em>hunt for
- “whales” who can be led</em></ins></span> to <span
class="removed"><del><strong>transmit
+ <p>While the article describes gratis games, games that cost money
+ can use the same tactics.</p>
+ </li>
+
+ <li id="M201401280">
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</em></ins></span> and <span
class="inserted"><ins><em>the NSA takes advantage</em></ins></span>
+ to <span class="removed"><del><strong>transmit
conversations too</a>.</p>
</li>
<li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span> <span class="inserted"><ins><em>spy through it
too</a>. Here's information on</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>spend a lot of money. They also
- use</em></ins></span> a back <span class="removed"><del><strong>door,
but</strong></del></span> <span class="inserted"><ins><em>door to manipulate
the game play for specific players.</p>
+ <p>The article says this</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
- <p>While the article describes gratis games, games</em></ins></span>
that <span class="removed"><del><strong>could be a
- misunderstanding. However, it is certainly surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>cost money
- can use the same tactics.</p></em></ins></span>
+ <p><a
+
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+ <li id="M200510200">
+ <p>Blizzard Warden</em></ins></span> is a <span
class="removed"><del><strong>back door, but</strong></del></span> <span
class="inserted"><ins><em>hidden
+ “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>could be</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
+ least.</p></strong></del></span> <span
class="inserted"><ins><em>gamer's computer and sniffs a
+ good deal of personal data</a>, including lots of activities which
+ have nothing to do with cheating.</p></em></ins></span>
+ </li>
+</ul>
+
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+
+
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+<span class="removed"><del><strong><div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708280">
+ <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401280">
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+<li><p></strong></del></span> <span class="inserted"><ins><em>many
Internet of Stings devices allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>people
that use them</a>.</p>
+
+ <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all the stings.</p>
+
+ <p>It</em></ins></span> is <span class="removed"><del><strong>not
really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
- to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>spy through it
too</a>. Here's information</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1874,17 +1921,11 @@
<ul>
<li><p>Investigation
- Shows</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
-
- <p><a
-
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about</em></ins></span> NSA <span class="removed"><del><strong>To
Route Around Domestic Surveillance
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect the emails of members of Parliament
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
this way, because they pass it through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
@@ -1903,47 +1944,22 @@
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> spying</a>.</p>
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>article uses the term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+</ul>
- <span class="inserted"><ins><em><li id="M200510200">
- <p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's computer and
sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
- </li>
-</ul></em></ins></span>
+<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareOnTheRoad">Spyware
on The Road</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-<div style="clear: left;"></div>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
-
- <p>Don't be a sucker—reject all the stings.</p>
-
- <p>It is unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
- </li>
-</ul></em></ins></span>
+<div style="clear: left;"></div></strong></del></span>
<div class="big-subsection">
@@ -1980,8 +1996,8 @@
<li id="M201702060">
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
+ report everything that is viewed</em></ins></span> on <span
class="inserted"><ins><em>them, and not just broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>image is coming from the user's own computer,
the TV reports what it is. The existence of a way to disable the
surveillance, even if it were not hidden as it was in these TVs,
does not legitimize the surveillance.</p>
@@ -1999,7 +2015,7 @@
<li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying</em></ins></span> on <span
class="removed"><del><strong>the fact</strong></del></span> <span
class="inserted"><ins><em>their users: their <a
+ manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so</em></ins></span> that <span
class="removed"><del><strong>the device</strong></del></span> <span
class="inserted"><ins><em>advertisers can track you
@@ -2135,215 +2151,214 @@
<p>The report was as</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
payment systems,</strong></del></span> <span
class="inserted"><ins><em>2014,</em></ins></span> but <span
class="removed"><del><strong>the invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in the
car.</p></li>
-
- <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>we don't expect this has got
+ cases mentioned</strong></del></span> <span class="inserted"><ins><em>we
don't expect this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to
<span class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>get users' formal
- consent before collecting personal</em></ins></span> data <span
class="removed"><del><strong>remotely and
- determine the car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information, but</strong></del></span> <span
class="inserted"><ins><em>are totally inadequate.
- And what happens</em></ins></span> if <span class="inserted"><ins><em>a
user declines consent? Probably</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report
what</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p></strong></del></span>
- <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the <span class="removed"><del><strong>car's location at
any time. (See</strong></del></span>
+ <span class="inserted"><ins><em>user watches—no exceptions!</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Lots of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405200">
- <p>Spyware in LG</em></ins></span> “smart” <span
class="removed"><del><strong>products are
- designed</strong></del></span> <span
class="inserted"><ins><em>TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in</strong></del></span>
+ <li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>user watches, and</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data
+ <span class="removed"><del><strong>and hand</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
- <p>Today's technological practice does not include any way of
- making</strong></del></span> <span class="inserted"><ins><em>switch to
turn this off has
- no effect</a>. (The fact that the transmission
reports</em></ins></span> a <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>404 error
- really means nothing; the server could save</em></ins></span> that <span
class="removed"><del><strong>can obey your voice commands without
- potentially spying on you. Even if</strong></del></span> <span
class="inserted"><ins><em>data anyway.)</p>
-
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>is air-gapped,</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
-
- <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch to stop this, but any
- product</em></ins></span> could <span class="removed"><del><strong>be
- saving up records about you for later examination.</p>
- </li>
+ snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
- <li><p>Nest thermometers
- send</strong></del></span> <span class="inserted"><ins><em>spy this
way.</p>
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span class="removed"><del><strong>data about
the user</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
<span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
- and use its camera to watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>a
“smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span>
+<ul>
+ <li><p>Lots</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span class="removed"><del><strong>other
way.” Evidently that was
-before</strong></del></span> <span class="inserted"><ins><em>video they
capture to</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>servers</a> which save it
+ send the video they capture to Amazon servers</a> which save it
permanently.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of</em></ins></span> everything
<span class="removed"><del><strong>that is viewed on</strong></del></span>
<span class="inserted"><ins><em>they
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested</em></ins></span> them, <span
class="removed"><del><strong>and</strong></del></span> <span
class="inserted"><ins><em>it suggested that these
- manufacturers promise</em></ins></span> not <span
class="removed"><del><strong>just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>to look at what's in</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
+ <p>Over 70 brands</em></ins></span> of <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
</li>
<li id="M201511250">
- <p>The Nest Cam “smart” camera</em></ins></span> is
<span class="removed"><del><strong>coming from</strong></del></span> <span
class="inserted"><ins><em><a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span class="removed"><del><strong>user's
own
- computer,</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
-
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>is. The existence of a way</strong></del></span>
- to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
+ <p>The Nest Cam</em></ins></span> “smart” <span
class="removed"><del><strong>products are
+ designed</strong></del></span> <span class="inserted"><ins><em>camera
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in the house, all</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+
+ <p>Today's technological practice does not include any way of
+ making a device that can obey your voice commands without
+ potentially spying on you. Even if</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="inserted"><ins><em>“off.”</p>
+
+ <p>A “smart” device means the
manufacturer</em></ins></span> is <span
class="removed"><del><strong>air-gapped,</strong></del></span> <span
class="inserted"><ins><em>using</em></ins></span> it <span
class="removed"><del><strong>could be
+ saving up records about you for later examination.</p>
+ </li>
+
+ <li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p>
+ </li>
+
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+ to <span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips
made</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
+ <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not
hidden</strong></del></span> <span class="inserted"><ins><em>product as shipped
doesn't act</em></ins></span> as <span class="inserted"><ins><em>a
- listening device, remote changes to the code could surely
convert</em></ins></span> it
- <span class="inserted"><ins><em>into one.</p>
+ universal back door</a>. If the product as shipped doesn't act
as</em></ins></span> a <span class="removed"><del><strong>woman came
up</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently
that</strong></del></span> <span class="inserted"><ins><em>code could surely
convert it
+ into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ <p>A remote-control sex toy</em></ins></span> was
+<span class="removed"><del><strong>before Amazon “smart”
TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>found to make</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
+ </li>
+
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span
class="inserted"><ins><em>proprietary control app</a>.</p>
+
+ <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span
class="inserted"><ins><em>temperature</em></ins></span> of <span
class="removed"><del><strong>a way to
+ disable</strong></del></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>vibrator minute by
+ minute (thus, indirectly, whether</em></ins></span> it was <span
class="removed"><del><strong>in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
+ <li><p>More or less all “smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on</strong></del></span> <span class="inserted"><ins><em>totally inadequate
proposed response: a labeling
+ standard with which manufacturers would make statements
about</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>products, rather than free software which
users could have checked
+ and changed.</p></em></ins></span>
- <span class="inserted"><ins><em><li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on <span class="removed"><del><strong>their
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its users through the proprietary control
app</a>.</p></em></ins></span>
+ <p>The <span class="removed"><del><strong>report was as of 2014, but
we don't expect this has got better.</p>
- <p>The <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> was <span
class="removed"><del><strong>as</strong></del></span> <span
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+ consent before</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for</em></ins></span> collecting <span
class="inserted"><ins><em>lots of</em></ins></span> personal <span
class="inserted"><ins><em>information about how people
+ used it</a>.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent to tracking,</strong></del></span>
<span class="inserted"><ins><em>vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>TV will
+ <p>The company's statement that it was anonymizing
the</em></ins></span> data <span class="removed"><del><strong>are totally
inadequate.
+ And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>may be
+ true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>TV will
not work.”</p>
- <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>vibration
frequency.</p>
-
- <p>Note</em></ins></span> the <span
class="removed"><del><strong>user watches — no exceptions!</p>
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
+ user <span class="removed"><del><strong>watches — no
exceptions!</p>
</li>
- <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>totally inadequate proposed
response:</em></ins></span> a <span class="removed"><del><strong>step further
than other TV</strong></del></span> <span class="inserted"><ins><em>labeling
- standard with which</em></ins></span> manufacturers <span
class="removed"><del><strong>in spying on
- their users:</strong></del></span> <span class="inserted"><ins><em>would
make statements about</em></ins></span> their <span
class="removed"><del><strong><a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span class="inserted"><ins><em>products, rather than free software which
users could have checked</em></ins></span>
- and
- <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>changed.</p>
-
- <p>The company</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying on
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn this off,</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
- used it</a>.</p>
+ <p>It is possible to turn</strong></del></span> <span
class="inserted"><ins><em>was.</p>
- <p>The company's statement that it was anonymizing the data may be
- true,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> it <span
class="removed"><del><strong>enabled by default
+ <p>Following</em></ins></span> this <span
class="removed"><del><strong>off, but having it enabled by default
is an injustice already.</p>
</li>
- <li><p>Tivo's alliance with Viacom adds 2.3 million households
to</strong></del></span> <span class="inserted"><ins><em>doesn't really matter.
If it had sold</em></ins></span> the <span class="removed"><del><strong>600
millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>data to a data
- broker,</em></ins></span> the <span class="removed"><del><strong>company
already
+ <li><p>Tivo's alliance with Viacom adds 2.3 million households to
+ the 600 millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the company <span class="removed"><del><strong>already
monitors. Tivo customers are unaware they're being watched by
advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out who the
- user was.</p>
-
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement</strong></del></span> <span class="inserted"><ins><em>has
been ordered to pay a total of C$4m</a> to its
customers.</p>
</li>
@@ -2371,29 +2386,24 @@
<p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="inserted"><ins><em>i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span> <span
class="inserted"><ins><em>speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p></strong></del></span>
<span class="inserted"><ins><em>speech recognition
+ company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in</em></ins></span> on <span
class="inserted"><ins><em>a child's speech, and even speak
into</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span>
- <span class="inserted"><ins><em>toys themselves.</p>
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>would then have</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping all the time</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2403,11 +2413,10 @@
<ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>the internet</strong></del></span>
<span class="inserted"><ins><em>you</a>.</p>
</li>
</ul>
@@ -2418,8 +2427,10 @@
<ul class="blurbs">
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>would then have to
+ give</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
<p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
@@ -2534,38 +2545,33 @@
<ul>
<li>
- <p>The driver for a certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
- to China</a>.</p>
- </li>
-
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+ <p>The driver for a certain gaming keyboard</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
tracked the choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
<p>GM did not get users' consent, but it could have got that easily
by
- sneaking it into the contract that</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends
personal</strong></del></span> <span class="inserted"><ins><em>sign for some
digital service
+ sneaking it into the contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to you,
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></strong></del></span>
<span class="inserted"><ins><em>you,
watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>about them</strong></del></span> <span
class="inserted"><ins><em>collection should be forbidden.</p>
+ phones. <em>All</em> such data collection should be
forbidden.</p>
- <p>But if you really want</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
+ <p>But if you really want to be safe, we must make sure the car's
hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that
data.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+ <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience</strong></del></span>
<span class="inserted"><ins><em><li id="M201711230">
- <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span>
+ <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p>
</li>
@@ -2580,11 +2586,24 @@
<p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>the NSA takes advantage</strong></del></span>
<span class="inserted"><ins><em>make changes in various
+ access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about
them</strong></del></span> <span class="inserted"><ins><em>make changes in
various
settings</a>.</p>
- <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
- when accessed</em></ins></span> through <span
class="inserted"><ins><em>the modem. However, even if</em></ins></span> it
<span class="removed"><del><strong>too</a>.
+ <p>That's easy</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
+ enables the phone company</em></ins></span> to <span
class="removed"><del><strong>spy through</strong></del></span> <span
class="inserted"><ins><em>track the car's movements all the
time;</em></ins></span>
+ it <span class="removed"><del><strong>too</a>.
Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -2592,20 +2611,13 @@
More about NSA app spying</a>.</p>
</li>
- <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
- it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</em></ins></span> to the
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span class="inserted"><ins><em>physically
remove</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
- enables the phone company to track the car's movements all the time;
- it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
+ <p>A game console is a computer, and you can't trust a computer
with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
@@ -2634,13 +2646,13 @@
<p>They use this data to manipulate people</strong></del></span>
<span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who can be led to spend</strong></del></span>
<span class="inserted"><ins><em>others.</p>
+ for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
- <p>The case of toll-collection systems, mentioned in this article,
- is not really</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>matter</em></ins></span> of <span
class="removed"><del><strong>money. They
- also use a back door to manipulate the game play for specific
players.</p>
+ <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+ is not really</em></ins></span> a <span class="removed"><del><strong>back
door to manipulate the game play for specific players.</p>
- <p>While</strong></del></span> <span
class="inserted"><ins><em>proprietary surveillance. These systems
+ <p>While</strong></del></span> <span
class="inserted"><ins><em>matter of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
anonymous payment systems, but</em></ins></span> the <span
class="removed"><del><strong>article describes gratis games, games that cost
money
can use</strong></del></span> <span class="inserted"><ins><em>invasion
isn't done by malware. The
@@ -2707,6 +2719,13 @@
<li><p>When</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
+
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
@@ -3060,7 +3079,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/01/21 09:31:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- proprietary-surveillance.de.po 13 Jan 2019 09:29:35 -0000 1.251
+++ proprietary-surveillance.de.po 21 Jan 2019 09:31:05 -0000 1.252
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -4063,6 +4063,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/"
"revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
"the reporters that use it</a>."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.360
retrieving revision 1.361
diff -u -b -r1.360 -r1.361
--- proprietary-surveillance.fr.po 17 Jan 2019 06:30:32 -0000 1.360
+++ proprietary-surveillance.fr.po 21 Jan 2019 09:31:05 -0000 1.361
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2019-01-13 10:54+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3345,6 +3346,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/"
"revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
"the reporters that use it</a>."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary-surveillance.it-diff.html 17 Jan 2019 06:30:32 -0000
1.101
+++ proprietary-surveillance.it-diff.html 21 Jan 2019 09:31:05 -0000
1.102
@@ -1413,7 +1413,7 @@
<p>Specifically,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>demands to personal data in the
device</a>.</p>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
@@ -1923,52 +1923,72 @@
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing;</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>server could save that data anyway.)</p>
+ really means nothing; the server could save that data anyway.)</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+ product could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul>
- <li><p>Spyware in Skype:</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a> which save it
+ permanently.</p>
+ </li>
- <p>LG later said it had installed a patch to stop this, but any
- product could spy this way.</p>
+ <li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p></em></ins></span>
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1979,78 +1999,53 @@
</div>
<ul>
- <li>
- <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> “smart” <span
class="inserted"><ins><em>TV</a>
- and use its</em></ins></span> camera <span class="removed"><del><strong>is
<a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using
it</strong></del></span> to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201511250"></em></ins></span>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when the “owner” switches it “off.”</p>
+
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
+<ul>
<li><p>E-books can contain Javascript code,
- and</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
this code snoops on readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not
only</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>video</em></ins></span> they <span
class="removed"><del><strong>report even</strong></del></span> <span
class="inserted"><ins><em>capture to Amazon servers</a></em></ins></span>
which <span class="removed"><del><strong>page</strong></del></span> <span
class="inserted"><ins><em>save it
- permanently.</p>
- </li>
-
- <li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>user
reads</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
- name!</p>
-
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look</em></ins></span> at <span
class="removed"><del><strong>what time</a>.</p>
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
</li>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>what's
in</em></ins></span> the <span class="removed"><del><strong>e-reader used
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span> <span class="inserted"><ins><em>videos.
That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
- </li>
-
- <li id="M201603220">
- <p>Over 70 brands</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>watch
through them</a>.</p>
- </li>
-
- <li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
-
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
- to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <h4 id="SpywareInVehicles">Spyware in
Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
<span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
@@ -2105,58 +2100,59 @@
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from</strong></del></span>
<span class="inserted"><ins><em>was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
<p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
- though.</p></strong></del></span> <span class="inserted"><ins><em>its
- customers.</p></em></ins></span>
- </li>
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
to</em></ins></span> its <span
class="removed"><del><strong>users</a>.</p>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
+ <p>Even if no one connects</strong></del></span>
+ <span class="inserted"><ins><em>customers.</p>
+ </li>
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in the
car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> the <span
class="removed"><del><strong>company to extract data remotely and
- determine</strong></del></span>
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>phone company to track</strong></del></span>
<span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p>
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p></em></ins></span>
</li>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201612060">
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies, and
+ others.</p>
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>store it.</p>
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span class="inserted"><ins><em>Nuance
Communications</a>,</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>speech recognition
+ company based</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract
data</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can</em></ins></span> remotely <span class="removed"><del><strong>and
+ determine the car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>control</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>get the
data</strong></del></span> <span class="inserted"><ins><em>listen in on a
child's speech,</em></ins></span> and <span class="removed"><del><strong>hand
it over,</strong></del></span> <span class="inserted"><ins><em>even speak
into</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<!-- #SpywareAtHome -->
@@ -2170,18 +2166,16 @@
<ul>
<li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
- crackers to listen in on a child's speech, and even speak
into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ send</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
@@ -2238,65 +2232,72 @@
<p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
- easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
not work.”</p>
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
+ <p>Proper laws would say that TVs are not allowed to report what
+ the user watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV manufacturers in
spying on
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>some government such as China or the US
+ told Amazon</em></ins></span> to <span class="removed"><del><strong>turn
this off, but having it enabled by default
+ is an injustice already.</p>
+ </li>
+
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>do this, or
cease</em></ins></span> to <span
class="inserted"><ins><em>sell</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>product in that
country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>moral fiber to say no?</p>
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking”</em></ins></span> to
+ <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>mean
“breaking security”</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
+ <li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on
- <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>its user by
- sending usage data back over the Internet</a>.</p>
+ offers a gratis electronic toothbrush that snoops on its
user</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
+ <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>products are
designed <a
+ <p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone</em></ins></span> in <span
class="removed"><del><strong>detail and
- link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>the house, all the time</a>.</p>
+ listen</em></ins></span> to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other
devices</strong></del></span> <span
class="inserted"><ins><em>everyone</em></ins></span> in
+ <span class="removed"><del><strong>range so as to
determine</strong></del></span> <span class="inserted"><ins><em>the house, all
the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track you
- across devices.</p>
-
- <p>It is possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
- on you. Even if</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
- about you for later examination.</p></em></ins></span>
+ a device</em></ins></span> that <span class="removed"><del><strong>they
are nearby. Once your
+ Internet devices are paired with your TV,
advertisers</strong></del></span> can
+ <span class="removed"><del><strong>correlate ads with Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>obey your
voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about the user</a>.</p>
+ data about the user</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
- <li id="M201310260">
+ <span class="inserted"><ins><em><li id="M201310260">
<p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
- range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
@@ -2308,27 +2309,23 @@
<ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing <a
-
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p>
-
- <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>companies
- monitor every aspect of what they do.</p></em></ins></span>
+ <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ monitor how often</em></ins></span> people <span
class="removed"><del><strong>are watching</a>,
+ even if</strong></del></span> <span class="inserted"><ins><em>wear
it</a>.</p>
+
+ <p>This will teach the sheeple to find</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>normal that companies
+ monitor every aspect of what they do.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ <p>A very cheap “smart watch” comes with an Android app
<a
+
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
<p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>back door, but that could be a
@@ -2389,21 +2386,37 @@
snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
<p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
- is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed</strong></del></span> <span
class="inserted"><ins><em>won't collect any of that data.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
- <span class="inserted"><ins><em><li id="M201711230">
+ <li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></em></ins></span>
+ track your every move</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+
+ <li id="M201607160">
+ <p>Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li>
+
+ <li id="M201602240">
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>patch</strong></del></span> <span
class="inserted"><ins><em>built-in
+ cell phone modem which allows effectively anyone</em></ins></span> to
<span class="removed"><del><strong>stop this, but any product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>even what they wanted</strong></del></span> <span
class="inserted"><ins><em>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>record.</a></p>
+ </li>
+</ul>
<!-- #SpywareAtPlay -->
<div class="big-section">
@@ -2413,59 +2426,45 @@
<div style="clear: left;"></div>
<ul>
-<li><p>Users</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607160">
- <p>Computerized cars with nonfree software</em></ins></span> are
<span class="removed"><del><strong>suing Bose for</strong></del></span> <a
+<li><p>Users are suing Bose</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
+ when accessed through the modem. However, even if it
asked</em></ins></span>
+ for <span class="inserted"><ins><em>authentication, you couldn't be
confident that Nissan
+ has no access. The software in the car is proprietary,</em></ins></span>
<a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
- </li>
-
- <li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
- cell phone modem which allows effectively anyone to <a
- href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
-Specifically, the app would record the names of the audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
- settings</a>.</p>
+distributing a spyware app for</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ it demands blind faith from</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
+Specifically,</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
- <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
+ <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>cell phone modem
+ enables</em></ins></span> the <span class="removed"><del><strong>audio
files
+users listen</strong></del></span> <span class="inserted"><ins><em>phone
company</em></ins></span> to <span class="removed"><del><strong>along with the
headphone's unique serial number.
</p>
<p>The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>do
because</em></ins></span> the <span class="removed"><del><strong>fine print
of</strong></del></span> <span class="inserted"><ins><em>system has no
authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>modem.
However, even if</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It
should</strong></del></span> <span class="inserted"><ins><em>asked
- for authentication, you couldn't</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>confident that Nissan
- has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
- it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
-</p>
-</li>
+If</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> the <span
class="removed"><del><strong>fine print of</strong></del></span> <span
class="inserted"><ins><em>car's movements all</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span
class="inserted"><ins><em>time;</em></ins></span>
+ it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>cell phone
modem, though.</p></em></ins></span>
+ </li>
- <li><p>Many
+ <span class="removed"><del><strong><li><p>Many
<a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the
cell phone modem
- enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track</em></ins></span> the
+ video game consoles snoop on their users and report
to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201306140">
+ <p>Tesla cars allow</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car's movements all the time;
- it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
+ <p>A game console is a computer, and you can't trust a computer
with
+ a nonfree operating system.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
+ <li><p>Modern gratis game cr…apps
<a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201306140">
- <p>Tesla cars allow the company to extract</em></ins></span>
+ collect a wide range of</strong></del></span> <span
class="inserted"><ins><em>company to extract</em></ins></span>
data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
@@ -2534,13 +2533,20 @@
programs, so it
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
makes no sense to call them “free” or
“proprietary”</a>,
- but the surveillance is an abuse all the same.</p>
+ but the surveillance is an abuse all the <span
class="removed"><del><strong>same.</p>
-<span class="removed"><del><strong><ul>
+<ul>
- <li><p>When</strong></del></span>
+ <li><p>When</strong></del></span> <span
class="inserted"><ins><em>same.</p>
+
+<ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
@@ -2867,7 +2873,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 06:30:32 $
+$Date: 2019/01/21 09:31:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary-surveillance.it.po 13 Jan 2019 09:29:35 -0000 1.264
+++ proprietary-surveillance.it.po 21 Jan 2019 09:31:05 -0000 1.265
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3820,6 +3820,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/"
"revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
"the reporters that use it</a>."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary-surveillance.ja-diff.html 17 Jan 2019 06:30:32 -0000
1.111
+++ proprietary-surveillance.ja-diff.html 21 Jan 2019 09:31:05 -0000
1.112
@@ -1253,182 +1253,101 @@
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice</em></ins></span>
of <span class="removed"><del><strong>Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>their being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what</em></ins></span> they
<span class="removed"><del><strong>pass it through
Microsoft.</p></li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>do.</p>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google, or Android users,</em></ins></span>
- to <span class="removed"><del><strong>place new items on top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and
study</em></ins></span>
- the <span class="removed"><del><strong>manufacturer is
using</strong></del></span> <span class="inserted"><ins><em>source code somehow
to determine whether they mistreat users in
- various ways. If it did a good job of this,</em></ins></span> it <span
class="inserted"><ins><em>could more or less
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat
users</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP
phones:</strong></del></span>
+ <span class="inserted"><ins><em>various ways. If it did a good job of
this, it could more or less
prevent such snooping, except when the app developers are clever
- enough</em></ins></span> to outsmart
- <span class="removed"><del><strong>you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this</strong></del></span> <span class="inserted"><ins><em>the
checking.</p>
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source</em></ins></span>
code <span class="removed"><del><strong>snoops</strong></del></span> <span
class="inserted"><ins><em>to the
- public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>each other.</p></em></ins></span>
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
- Kindle:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
+ <li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that</em></ins></span> they <span
class="removed"><del><strong>report even which page the user reads at what
time</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>don't snoop.</p>
+ <p>With free software apps, users could <em>make
sure</em> that they
+ don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used</strong></del></span>
+<ul>
+ <li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track users</em></ins></span>
by <span class="removed"><del><strong>most US libraries,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do</em></ins></span> lots of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>surveillance, judging by <a
-
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware</strong></del></span> <span
class="inserted"><ins><em>personal data</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>the
device</a>.</p>
+ <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
- <p>Users</em></ins></span> are <span class="inserted"><ins><em>suing
Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
+</ul>
- <li><p>The Nissan Leaf has</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access</strong></del></span> <span class="inserted"><ins><em>spyware app
for</em></ins></span> its <span class="removed"><del><strong>computers remotely
and make changes in various
- settings</a>.</p>
- <p>That's easy to do because</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,</em></ins></span>
- the <span class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span class="inserted"><ins><em>app
would record</em></ins></span> the <span class="removed"><del><strong>modem.
However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>names of</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>audio files users listen</em></ins></span> to
- <span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
-
- <p>The suit accuses that this was done without</em></ins></span> the
<span class="removed"><del><strong>phone company to track</strong></del></span>
<span class="inserted"><ins><em>users' consent.
- If</em></ins></span> the <span class="removed"><del><strong>car's
movements all</strong></del></span> <span class="inserted"><ins><em>fine print
of</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>app said that users gave consent for this,
- would that make</em></ins></span> it <span class="removed"><del><strong>is
possible</strong></del></span> <span class="inserted"><ins><em>acceptable? No
way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
- the <span class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>app to snoop at
all</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Proprietary software
in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs of Android apps can collude</em></ins></span>
- to <span class="removed"><del><strong>car manufacturers, insurance
companies, and
- others.</p>
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS:</strong></del></span> <span class="inserted"><ins><em>its
headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>design
+ the app to snoop at all</a>.</p>
+ </li>
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data to servers. <a
+ <li id="M201704074">
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article, is not
- really a matter</strong></del></span> <span
class="inserted"><ins><em>thousands</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> <span class="inserted"><ins><em>pairs that
collude</a>.</p>
+ study found tens of thousands of pairs that collude</a>.</p>
</li>
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced</em></ins></span> an
- <span class="removed"><del><strong>intolerable
invasion</strong></del></span> <span class="inserted"><ins><em>opt-in
proprietary search app that it will</a> pre-install
- on some</em></ins></span> of <span class="removed"><del><strong>privacy,
and should be replaced with anonymous
- payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>its
phones.</em></ins></span> The <span class="removed"><del><strong>other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>car.</p></li>
+ announced an opt-in proprietary search app that it will</a>
pre-install</em></ins></span>
+ on <span class="removed"><del><strong>top under each subsection -->
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>same information
+<div class="big-section"></strong></del></span> <span
class="inserted"><ins><em>some of its phones. The app will give Verizon the
same information
about the users' searches that Google normally gets when they use
its search engine.</p>
@@ -1759,8 +1678,8 @@
-<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+<div class="big-section"></em></ins></span>
+ <h3 <span
class="removed"><del><strong>id="SpywareOnTheRoad">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInEquipment">Spyware in
Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1836,8 +1755,8 @@
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles</em></ins></span> the company
- <span class="inserted"><ins><em>already monitors. Tivo customers are
unaware they're
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
@@ -1861,8 +1780,14 @@
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ used a firmware “upgrade” to make its TVs
snoop</em></ins></span> on <span class="inserted"><ins><em>what
+ users watch</a>.</em></ins></span> The <span
class="removed"><del><strong>Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
@@ -1901,75 +1826,135 @@
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the <span class="removed"><del><strong>car's location at
any time. (See</strong></del></span>
- <span class="inserted"><ins><em>user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>LG</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ reports what</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device</strong></del></span> <span
class="inserted"><ins><em>user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data
- <span class="removed"><del><strong>and hand</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
+ really</em></ins></span> means <span
class="inserted"><ins><em>nothing;</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>server could save that data anyway.)</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>to outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"></em></ins></span>
+ snoops on <span class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>other
devices on</em></ins></span> the <span class="removed"><del><strong>e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p></em></ins></span>
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do</em></ins></span> lots of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The Nissan Leaf
has</strong></del></span>
<span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>a
“smart” TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
+ accessed through the modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in the car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from</strong></del></span> <span
class="inserted"><ins><em>break security on a “smart” TV</a>
+ and use</em></ins></span> its <span
class="removed"><del><strong>users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>camera</em></ins></span> to <span
class="inserted"><ins><em>watch</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>people
who are watching TV.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
+ send</em></ins></span> the <span class="removed"><del><strong>phone
company</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="removed"><del><strong>track the car's
movements all
+ the time;</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a> which save</em></ins></span> it <span
class="removed"><del><strong>is possible to physically remove the cell phone
modem
+ though.</p></strong></del></span>
+ <span class="inserted"><ins><em>permanently.</p></em></ins></span>
</li>
- <li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available to car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really a matter of proprietary surveillance. These systems
are</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer</em></ins></span> an
+ <span class="removed"><del><strong>intolerable
invasion</strong></del></span> <span class="inserted"><ins><em>unencrypted
copy</em></ins></span> of <span class="removed"><del><strong>privacy, and
should</strong></del></span> <span class="inserted"><ins><em>everything they
+ see</a>. “Home insecurity camera”
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems, but the invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ manufacturers promise not to look at what's</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -1977,15 +1962,35 @@
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ security bugs that</em></ins></span> allow <span
class="removed"><del><strong>the company</strong></del></span> <span
class="inserted"><ins><em>anyone</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>watch through them</a>.</p>
</li>
<li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
+ <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span class="removed"><del><strong>state
orders</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="removed"><del><strong>to get</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
+
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>over, the state can store it.</p>
+ </li>
+</ul>
+
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
to <span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
</ul>
@@ -2050,19 +2055,18 @@
broker,</em></ins></span> the <span class="removed"><del><strong>TV will
not work.”</p>
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who the
- user was.</p>
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
+ user <span class="removed"><del><strong>watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>was.</p>
<p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>user watches — no
exceptions!</p>
- </li>
- <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>company has been ordered to pay</em></ins></span> a
<span class="removed"><del><strong>step further than other TV manufacturers in
spying on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
- customers.</p>
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
- <li id="M201702280">
+ <span class="inserted"><ins><em><li id="M201702280">
<p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in
detail</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
@@ -2137,7 +2141,7 @@
<p>It was very difficult for them to do this. The job would be much
easier for Amazon. And if some government such</em></ins></span> as <span
class="inserted"><ins><em>China or the US
- told Amazon to do this, or cease</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>sell the product in</em></ins></span> that <span
class="removed"><del><strong>they are nearby. Once your
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell the product
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.
Once your
Internet devices</strong></del></span> <span
class="inserted"><ins><em>country,
do you think Amazon would have the moral fiber to say no?</p>
@@ -2218,7 +2222,8 @@
<li id="M201407090">
<p>An LG “smart” watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else</em></ins></span> and <span
class="removed"><del><strong>would then</strong></del></span> <span
class="inserted"><ins><em>to transmit conversations
+ to report its location to someone else</em></ins></span> and <span
class="removed"><del><strong>would then have</strong></del></span> to
+ <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
too</a>.</p>
</li>
</ul>
@@ -2236,12 +2241,11 @@
tracked the choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but it could</em></ins></span>
have <span class="inserted"><ins><em>got that easily by
- sneaking it into the contract that users sign for some digital service
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking</em></ins></span> it <span class="inserted"><ins><em>into the
contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to
- <span class="removed"><del><strong>give it</strong></del></span> <span
class="inserted"><ins><em>you,
+ <p>The cars can also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
@@ -2288,11 +2292,14 @@
<p>LG later said it had installed a patch to stop this, but any
product
could spy this way.</p>
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
<li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>record.</a></p>
</li>
</ul>
@@ -2304,16 +2311,13 @@
<div style="clear: left;"></div>
<ul>
- <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
- it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</em></ins></span> to the
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>the car remotely,
the cell phone modem
+ enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
- enables the phone company to track the car's movements all the time;
+ <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car's movements all the time;
it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
</li>
@@ -2399,6 +2403,13 @@
<li><p>Online</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
+
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
@@ -2716,7 +2727,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 06:30:32 $
+$Date: 2019/01/21 09:31:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary-surveillance.ja.po 13 Jan 2019 09:29:35 -0000 1.237
+++ proprietary-surveillance.ja.po 21 Jan 2019 09:31:05 -0000 1.238
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3229,6 +3229,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/"
"revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
"the reporters that use it</a>."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary-surveillance.pot 13 Jan 2019 09:29:35 -0000 1.185
+++ proprietary-surveillance.pot 21 Jan 2019 09:31:05 -0000 1.186
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2299,6 +2299,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a "
+"href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\"> "
+"sent the precise GPS location to Twitter's server</a>. It still contains "
+"these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Storyful program <a "
"href=\"https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies
"
"on the reporters that use it</a>."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.452
retrieving revision 1.453
diff -u -b -r1.452 -r1.453
--- proprietary-surveillance.ru.po 17 Jan 2019 06:30:32 -0000 1.452
+++ proprietary-surveillance.ru.po 21 Jan 2019 09:31:05 -0000 1.453
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-13 09:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3303,6 +3304,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/"
"revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
"the reporters that use it</a>."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary.de-diff.html 17 Jan 2019 15:29:36 -0000 1.35
+++ proprietary.de-diff.html 21 Jan 2019 09:31:05 -0000 1.36
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -123,12 +123,12 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
+<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -183,6 +183,13 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
+
<li id="M201612290">
<p>In the game Fruit Pop, the player buys boosts with coins to get
a high score. The player gets coins at the end of each game, and can
@@ -229,16 +236,6 @@
Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p>
</li>
-
- <li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
-
- <p>Every nonfree program offers the user zero security against its
- developer. With this malfeature, GM has explicitly made things even
- worse.</p>
- </li>
</ul></em></ins></span>
@@ -299,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 15:29:36 $
+$Date: 2019/01/21 09:31:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.de.po 17 Jan 2019 15:29:36 -0000 1.77
+++ proprietary.de.po 21 Jan 2019 09:31:05 -0000 1.78
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -487,18 +494,6 @@
"WeatherBug, are tracking people's locations."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.es.po 19 Jan 2019 12:30:55 -0000 1.82
+++ proprietary.es.po 21 Jan 2019 09:31:05 -0000 1.83
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2019-01-03 11:29+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -302,6 +302,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -375,23 +382,6 @@
"incluidas <cite>Accuweather</cite> y <cite>WeatherBug</cite>, rastrean la "
"ubicación de los usuarios."
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-"Los nuevos modelos de vehÃculos de GM <a href=\"https://media.gm.com/media/"
-"us/en/gmc/vehicles/canyon/2019.html\">están dotados de una puerta trasera "
-"universal</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-"Todo programa que no es libre ofrece seguridad nula frente a su "
-"desarrollador, pero de este modo GM ha agravado aún más esa situación."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -471,6 +461,21 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
+#~ "canyon/2019.html\"> offer the feature of a universal back door</a>."
+#~ msgstr ""
+#~ "Los nuevos modelos de vehÃculos de GM <a href=\"https://media.gm.com/"
+#~ "media/us/en/gmc/vehicles/canyon/2019.html\">están dotados de una puerta "
+#~ "trasera universal</a>."
+
+#~ msgid ""
+#~ "Every nonfree program offers the user zero security against its "
+#~ "developer. With this malfeature, GM has explicitly made things even worse."
+#~ msgstr ""
+#~ "Todo programa que no es libre ofrece seguridad nula frente a su "
+#~ "desarrollador, pero de este modo GM ha agravado aún más esa situación."
+
+#~ msgid ""
#~ "Facebook's app got “consent” to <a href=\"https://www."
#~ "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
#~ "over-call-log-consent\"> upload call logs automatically from Android "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary.fr.po 17 Jan 2019 16:28:52 -0000 1.104
+++ proprietary.fr.po 21 Jan 2019 09:31:05 -0000 1.105
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2019-01-17 17:04+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -383,23 +391,6 @@
"party-weather-apps\">D'autres applis météo</a>, en particulier Accuweather "
"et WeatherBug, suivent l'utilisateur à la trace."
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-"Les nouveaux modèles de véhicules GM <a
href=\"https://media.gm.com/media/us/"
-"en/gmc/vehicles/canyon/2019.html\">sont dotés d'une fonctionnalité de porte
"
-"dérobée universelle</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-"Aucun des programmes non libres n'offre à l'utilisateur de sécurité contre
"
-"les attaques de son développeur, mais GM a explicitement aggravé les
choses."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,3 +464,19 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
+#~ "canyon/2019.html\"> offer the feature of a universal back door</a>."
+#~ msgstr ""
+#~ "Les nouveaux modèles de véhicules GM <a
href=\"https://media.gm.com/media/"
+#~ "us/en/gmc/vehicles/canyon/2019.html\">sont dotés d'une fonctionnalité de
"
+#~ "porte dérobée universelle</a>."
+
+#~ msgid ""
+#~ "Every nonfree program offers the user zero security against its "
+#~ "developer. With this malfeature, GM has explicitly made things even worse."
+#~ msgstr ""
+#~ "Aucun des programmes non libres n'offre à l'utilisateur de sécurité "
+#~ "contre les attaques de son développeur, mais GM a explicitement aggravé "
+#~ "les choses."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary.it-diff.html 17 Jan 2019 15:29:36 -0000 1.47
+++ proprietary.it-diff.html 21 Jan 2019 09:31:05 -0000 1.48
@@ -182,6 +182,13 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
+
<li id="M201612290">
<p>In the game Fruit Pop, the player buys boosts with coins to get
a high score. The player gets coins at the end of each game, and can
@@ -228,16 +235,6 @@
Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p>
</li>
-
- <li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
-
- <p>Every nonfree program offers the user zero security against its
- developer. With this malfeature, GM has explicitly made things even
- worse.</p>
- </li>
</ul></em></ins></span>
@@ -298,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 15:29:36 $
+$Date: 2019/01/21 09:31:05 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.it.po 17 Jan 2019 15:29:36 -0000 1.86
+++ proprietary.it.po 21 Jan 2019 09:31:06 -0000 1.87
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -491,18 +498,6 @@
"WeatherBug, are tracking people's locations."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary.ja-diff.html 17 Jan 2019 15:29:37 -0000 1.48
+++ proprietary.ja-diff.html 21 Jan 2019 09:31:08 -0000 1.49
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -155,10 +155,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -179,6 +179,13 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
+
<li id="M201612290">
<p>In the game Fruit Pop, the player buys boosts with coins to get
a high score. The player gets coins at the end of each game, and can
@@ -225,16 +232,6 @@
Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p>
</li>
-
- <li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
-
- <p>Every nonfree program offers the user zero security against its
- developer. With this malfeature, GM has explicitly made things even
- worse.</p>
- </li>
</ul></em></ins></span>
@@ -295,7 +292,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 15:29:37 $
+$Date: 2019/01/21 09:31:08 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.ja.po 17 Jan 2019 15:29:37 -0000 1.69
+++ proprietary.ja.po 21 Jan 2019 09:31:08 -0000 1.70
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -411,18 +418,6 @@
"WeatherBug, are tracking people's locations."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary.nl-diff.html 17 Jan 2019 15:29:37 -0000 1.47
+++ proprietary.nl-diff.html 21 Jan 2019 09:31:08 -0000 1.48
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -182,6 +182,13 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
+
<li id="M201612290">
<p>In the game Fruit Pop, the player buys boosts with coins to get
a high score. The player gets coins at the end of each game, and can
@@ -228,16 +235,6 @@
Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p>
</li>
-
- <li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
-
- <p>Every nonfree program offers the user zero security against its
- developer. With this malfeature, GM has explicitly made things even
- worse.</p>
- </li>
</ul></em></ins></span>
@@ -298,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 15:29:37 $
+$Date: 2019/01/21 09:31:08 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary.nl.po 17 Jan 2019 15:29:37 -0000 1.58
+++ proprietary.nl.po 21 Jan 2019 09:31:08 -0000 1.59
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -484,18 +491,6 @@
"WeatherBug, are tracking people's locations."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.pl-diff.html 17 Jan 2019 15:29:37 -0000 1.65
+++ proprietary.pl-diff.html 21 Jan 2019 09:31:08 -0000 1.66
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -125,17 +125,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -156,10 +156,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -180,6 +180,13 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
+
<li id="M201612290">
<p>In the game Fruit Pop, the player buys boosts with coins to get
a high score. The player gets coins at the end of each game, and can
@@ -226,16 +233,6 @@
Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p>
</li>
-
- <li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
-
- <p>Every nonfree program offers the user zero security against its
- developer. With this malfeature, GM has explicitly made things even
- worse.</p>
- </li>
</ul></em></ins></span>
@@ -296,7 +293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 15:29:37 $
+$Date: 2019/01/21 09:31:08 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary.pl.po 17 Jan 2019 15:29:37 -0000 1.53
+++ proprietary.pl.po 21 Jan 2019 09:31:08 -0000 1.54
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -566,18 +573,6 @@
"WeatherBug, are tracking people's locations."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary.pot 17 Jan 2019 15:29:37 -0000 1.50
+++ proprietary.pot 21 Jan 2019 09:31:08 -0000 1.51
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a "
+"href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\"> "
+"sent the precise GPS location to Twitter's server</a>. It still contains "
+"these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -300,19 +308,6 @@
"people's locations."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a "
-"href=\"https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html\"> "
-"offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its "
-"developer. With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.pt-br.po 20 Jan 2019 12:02:11 -0000 1.63
+++ proprietary.pt-br.po 21 Jan 2019 09:31:08 -0000 1.64
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2019-01-20 09:42-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -292,6 +293,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -382,23 +390,6 @@
"party-weather-apps\"> Outros aplicativos de meteorologia</a>, incluindo "
"Accuweather e WeatherBug, estão rastreando as localizações das pessoas."
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-"Novos carros da GM <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> oferecem o recurso de um back door universal</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-"Todo programa não livre oferece ao usuário segurança zero contra seu "
-"desenvolvedor. Com este mal-funcionamento, a GM explicitamente tornou as "
-"coisas ainda piores."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -474,6 +465,22 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
+#~ "canyon/2019.html\"> offer the feature of a universal back door</a>."
+#~ msgstr ""
+#~ "Novos carros da GM <a href=\"https://media.gm.com/media/us/en/gmc/"
+#~ "vehicles/canyon/2019.html\"> oferecem o recurso de um back door "
+#~ "universal</a>."
+
+#~ msgid ""
+#~ "Every nonfree program offers the user zero security against its "
+#~ "developer. With this malfeature, GM has explicitly made things even worse."
+#~ msgstr ""
+#~ "Todo programa não livre oferece ao usuário segurança zero contra seu "
+#~ "desenvolvedor. Com este mal-funcionamento, a GM explicitamente tornou as "
+#~ "coisas ainda piores."
+
+#~ msgid ""
#~ "Facebook's app got “consent” to <a href=\"https://www."
#~ "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
#~ "over-call-log-consent\"> upload call logs automatically from Android "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary.ru.po 17 Jan 2019 16:28:52 -0000 1.129
+++ proprietary.ru.po 21 Jan 2019 09:31:08 -0000 1.130
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2018-12-11 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-21 09:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -387,23 +395,6 @@
"party-weather-apps\"> ÐÑÑгие погоднÑе пÑиложениÑ</a>,
в Ñом ÑиÑле "
"Accuweather и WeatherBug, оÑÑлеживаÑÑ
меÑÑоположение лÑдей."
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-"ÐовÑе авÑомобили GM <a
href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> пÑедлагаÑÑ ÑÑнкÑиÑ
ÑнивеÑÑалÑного ÑеÑного Ñ
ода</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-"ÐÑÐ±Ð°Ñ Ð½ÐµÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма пÑедлагаеÑ
нÑлевÑÑ Ð·Ð°ÑиÑÑ Ð¾Ñ Ñвоего "
-"ÑазÑабоÑÑика. С помоÑÑÑ ÑÑой вÑедоноÑной
ÑÑнкÑии GM ÑвнÑм обÑазом еÑе "
-"ÑÑ
ÑдÑило ÑиÑÑаÑиÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -483,6 +474,22 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
+#~ "canyon/2019.html\"> offer the feature of a universal back door</a>."
+#~ msgstr ""
+#~ "ÐовÑе авÑомобили GM <a
href=\"https://media.gm.com/media/us/en/gmc/"
+#~ "vehicles/canyon/2019.html\"> пÑедлагаÑÑ ÑÑнкÑиÑ
ÑнивеÑÑалÑного ÑеÑного "
+#~ "Ñ
ода</a>."
+
+#~ msgid ""
+#~ "Every nonfree program offers the user zero security against its "
+#~ "developer. With this malfeature, GM has explicitly made things even worse."
+#~ msgstr ""
+#~ "ÐÑÐ±Ð°Ñ Ð½ÐµÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма пÑедлагаеÑ
нÑлевÑÑ Ð·Ð°ÑиÑÑ Ð¾Ñ Ñвоего "
+#~ "ÑазÑабоÑÑика. С помоÑÑÑ ÑÑой
вÑедоноÑной ÑÑнкÑии GM ÑвнÑм обÑазом еÑе "
+#~ "ÑÑ
ÑдÑило ÑиÑÑаÑиÑ."
+
+#~ msgid ""
#~ "Facebook's app got “consent” to <a href=\"https://www."
#~ "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
#~ "over-call-log-consent\"> upload call logs automatically from Android "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary.zh-tw-diff.html 17 Jan 2019 15:29:37 -0000 1.25
+++ proprietary.zh-tw-diff.html 21 Jan 2019 09:31:08 -0000 1.26
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -123,12 +123,12 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
+<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -183,6 +183,13 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201901101">
+ <p>Until 2015, any tweet that listed a geographical tag <a
+ href="https://www.wired.com/story/twitter-location-data-gps-privacy/">
+ sent the precise GPS location to Twitter's server</a>. It still
+ contains these GPS locations.</p>
+ </li>
+
<li id="M201612290">
<p>In the game Fruit Pop, the player buys boosts with coins to get
a high score. The player gets coins at the end of each game, and can
@@ -229,16 +236,6 @@
Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p>
</li>
-
- <li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
-
- <p>Every nonfree program offers the user zero security against its
- developer. With this malfeature, GM has explicitly made things even
- worse.</p>
- </li>
</ul></em></ins></span>
@@ -299,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 15:29:37 $
+$Date: 2019/01/21 09:31:08 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary.zh-tw.po 17 Jan 2019 15:29:37 -0000 1.36
+++ proprietary.zh-tw.po 21 Jan 2019 09:31:08 -0000 1.37
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-17 15:26+0000\n"
+"POT-Creation-Date: 2019-01-21 09:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In the game Fruit Pop, the player buys boosts with coins to get a high "
"score. The player gets coins at the end of each game, and can buy more coins "
"with real money."
@@ -400,18 +407,6 @@
"WeatherBug, are tracking people's locations."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"New GM cars <a href=\"https://media.gm.com/media/us/en/gmc/vehicles/"
-"canyon/2019.html\"> offer the feature of a universal back door</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Every nonfree program offers the user zero security against its developer. "
-"With this malfeature, GM has explicitly made things even worse."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- pt-br.po 19 Jan 2019 09:30:12 -0000 1.20
+++ pt-br.po 21 Jan 2019 09:31:08 -0000 1.21
@@ -5788,6 +5788,13 @@
msgid "Latest additions"
msgstr "Ãltimas adições"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- ru.po 19 Jan 2019 10:30:55 -0000 1.31
+++ ru.po 21 Jan 2019 09:31:08 -0000 1.32
@@ -7966,6 +7966,13 @@
msgid "Latest additions"
msgstr "ÐоÑледние добавлениÑ"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- zh-tw.po 19 Jan 2019 09:30:12 -0000 1.14
+++ zh-tw.po 21 Jan 2019 09:31:08 -0000 1.15
@@ -5660,6 +5660,13 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"https://www."
+"wired.com/story/twitter-location-data-gps-privacy/\"> sent the precise GPS "
+"location to Twitter's server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/14
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/17
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/19
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/28