www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-mobiles.html proprietar...


From: Therese Godefroy
Subject: www/proprietary malware-mobiles.html proprietar...
Date: Sat, 2 Feb 2019 08:13:31 -0500 (EST)

CVSROOT:        /webcvs/www
Module name:    www
Changes by:     Therese Godefroy <th_g> 19/02/02 08:13:31

Modified files:
        proprietary    : malware-mobiles.html proprietary-sabotage.html 
                         proprietary-surveillance.html proprietary.html 
        proprietary/workshop: mal.rec targets.rec 

Log message:
        Spying by Foundry software,
        new Desktop Apps subsection in p-surveillance (RT #1345812);
        Advertising ID sent to Facebook by Android apps (RT #1354309). 

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/targets.rec?cvsroot=www&r1=1.4&r2=1.5

Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-mobiles.html        28 Jan 2019 08:57:38 -0000      1.75
+++ malware-mobiles.html        2 Feb 2019 13:13:29 -0000       1.76
@@ -364,6 +364,21 @@
     tracking people's locations.</p> 
   </li>
 
+  <li id="M201812290">
+    <p>Around 40% of gratis Androids apps <a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
+    report on the user's actions to Facebook.</p>
+
+    <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.</p>
+
+    <p>This spying occurs regardless of whether the user has a Facebook
+    account.</p>
+  </li>
+
   <li id="M201812060">
     <p>Facebook's app got &ldquo;consent&rdquo; to <a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent";>
@@ -895,7 +910,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/28 08:57:38 $
+$Date: 2019/02/02 13:13:29 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary-sabotage.html   5 Jan 2019 11:26:11 -0000       1.74
+++ proprietary-sabotage.html   2 Feb 2019 13:13:29 -0000       1.75
@@ -36,6 +36,20 @@
 <div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
+  <li id="M201811020">
+    <p>Foundry's graphics software <a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
+    reports information to identify who is running it. The result is
+    often a legal threat demanding a lot of money.</p>
+
+    <p>The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.</p>
+
+    <p>This illustrates that making unauthorized copies of nonfree software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.</p>
+  </li>
+
   <li id="M201810240">
     <p>Apple and Samsung deliberately <a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones";>degrade
@@ -536,7 +550,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 11:26:11 $
+$Date: 2019/02/02 13:13:29 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary-surveillance.html       23 Jan 2019 12:57:07 -0000      1.231
+++ proprietary-surveillance.html       2 Feb 2019 13:13:29 -0000       1.232
@@ -95,6 +95,7 @@
   </li>
   <li><a href="#SpywareInApplications">Spyware in Applications</a>
     <ul>
+      <li><a href="#SpywareInDesktopApps">Desktop Apps</a></li>
       <li><a href="#SpywareInMobileApps">Mobile Apps</a></li>
       <li><a href="#SpywareInSkype">Skype</a></li>
       <li><a href="#SpywareInGames">Games</a></li>
@@ -741,6 +742,27 @@
 <div style="clear: left;"></div>
 
 <div class="big-subsection">
+  <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+</div>
+
+<ul class="blurbs">
+  <li id="M201811020">
+    <p>Foundry's graphics software <a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
+    reports information to identify who is running it. The result is
+    often a legal threat demanding a lot of money.</p>
+
+    <p>The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.</p>
+
+    <p>This illustrates that making unauthorized copies of nonfree software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.</p>
+  </li>
+</ul>
+
+<div class="big-subsection">
   <h4 id="SpywareInMobileApps">Mobile Apps</h4>
   <span class="anchor-reference-id">(<a 
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
 </div>
@@ -763,6 +785,21 @@
     tracking people's locations.</p> 
   </li>
 
+  <li id="M201812290">
+    <p>Around 40% of gratis Androids apps <a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
+    report on the user's actions to Facebook.</p>
+
+    <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.</p>
+
+    <p>This spying occurs regardless of whether the user has a Facebook
+    account.</p>
+  </li>
+
   <li id="M201810244">
     <p>Some Android apps <a
     
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/";>
@@ -2029,7 +2066,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/23 12:57:07 $
+$Date: 2019/02/02 13:13:29 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary.html    28 Jan 2019 08:57:38 -0000      1.71
+++ proprietary.html    2 Feb 2019 13:13:29 -0000       1.72
@@ -144,6 +144,64 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201812290">
+    <p>Around 40% of gratis Androids apps <a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
+    report on the user's actions to Facebook.</p>
+
+    <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.</p>
+
+    <p>This spying occurs regardless of whether the user has a Facebook
+    account.</p>
+  </li>
+
+  <li id="M201811020">
+    <p>Foundry's graphics software <a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
+    reports information to identify who is running it. The result is
+    often a legal threat demanding a lot of money.</p>
+
+    <p>The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.</p>
+
+    <p>This illustrates that making unauthorized copies of nonfree software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.</p>
+  </li>
+
+  <li id="M201812290">
+    <p>Around 40% of gratis Androids apps <a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
+    report on the user's actions to Facebook.</p>
+
+    <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.</p>
+
+    <p>This spying occurs regardless of whether the user has a Facebook
+    account.</p>
+  </li>
+
+  <li id="M201811020">
+    <p>Foundry's graphics software <a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
+    reports information to identify who is running it. The result is
+    often a legal threat demanding a lot of money.</p>
+
+    <p>The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.</p>
+
+    <p>This illustrates that making unauthorized copies of nonfree software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.</p>
+  </li>
+
   <li id="M201901110">
     <p>Samsung phones come preloaded with <a
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook";>
@@ -158,43 +216,6 @@
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook";>among
 others</a>)
     are going one step further in their hijacking of users' devices.</p>
   </li>
-
-  <li id="M201901101">
-    <p>Until 2015, any tweet that listed a geographical tag <a
-    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/";>
-    sent the precise GPS location to Twitter's server</a>. It still
-    contains these GPS locations.</p>
-  </li>
-
-  <li id="M201612290">
-    <p>In the game Fruit Pop, the player buys boosts with coins to get
-    a high score. The player gets coins at the end of each game, and can
-    buy more coins with real money.</p>
-
-    <p>Getting a higher score once leads the player to desire higher
-    score again later. But the higher score resulting from the boost <a
-    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/";>does
-    not give the player more coins, and does not help the player get
-    a higher score in subsequent games</a>. To get that, the player
-    will need a boost frequently, and usually has to pay real money
-    for that. Since boosts are exciting and entertaining, the player is
-    subtly pushed to purchase more coins with real money to get boosts,
-    and it can develop into a costly habit.</p>
-  </li>
-
-  <li id="M201612140">
-    <p>The Microsoft Telemetry Compatibility service <a
-    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs";>
-    drastically reduces the performances of machines running
-    Windows&nbsp;10</a>, and can't be disabled easily.</p>
-  </li>
-
-  <li id="M201901100">
-    <p>Amazon Ring &ldquo;security&rdquo; devices <a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/";>
-    send the video they capture to Amazon servers</a> which save it
-    permanently.</p>
-  </li>
 </ul>
 
 
@@ -255,7 +276,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/28 08:57:38 $
+$Date: 2019/02/02 13:13:29 $
 <!-- timestamp end -->
 </p>
 </div>

Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- workshop/mal.rec    28 Jan 2019 08:57:39 -0000      1.28
+++ workshop/mal.rec    2 Feb 2019 13:13:31 -0000       1.29
@@ -25,6 +25,45 @@
 ####    Please don't remove the blank line after this marker!    ####
 # ADD NEW BLURB HERE
 
+Added: 2019-02-02
+Id: 201812290
+RT: 1354309
+PubDate: 2018-12-29
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords: android facebook
+Blurb: <p>Around 40% of gratis Androids apps <a
++   
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report";>
++   report on the user's actions to Facebook.</p>
++
++   <p>Often they send the machine's &ldquo;advertising ID,&rdquo; so that
++   Facebook can correlate the data it obtains from the same machine via
++   various apps. Some of them send Facebook detailed information about
++   the user's activities in the app; others only say that the user is
++   using that app, but that alone is often quite informative.</p>
++
++   <p>This spying occurs regardless of whether the user has a Facebook
++   account.</p>
+
+Added: 2019-02-02
+Id: 201811020
+RT: 1345812
+PubDate: 2018-11-02
+Target: proprietary-surveillance.html SpywareInDesktopApps
+Target: proprietary-sabotage.html proprietary-sabotage
+Keywords: foundry
+Blurb: <p>Foundry's graphics software <a
++   
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/";>
++   reports information to identify who is running it. The result is
++   often a legal threat demanding a lot of money.</p>
++
++   <p>The fact that this is used for repression of forbidden sharing
++   makes it even more vicious.</p>
++
++   <p>This illustrates that making unauthorized copies of nonfree software
++   is not a cure for the injustice of nonfree software. It may avoid
++   paying for the nasty thing, but cannot make it less nasty.</p>
+
 Added: 2019-01-28
 Id: 201901110
 RT: 1350763

Index: workshop/targets.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/targets.rec,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- workshop/targets.rec        28 Jan 2019 08:57:39 -0000      1.4
+++ workshop/targets.rec        2 Feb 2019 13:13:31 -0000       1.5
@@ -83,7 +83,7 @@
 Targets: proprietary-subscriptions
 
 Page: proprietary-surveillance.html
-Targets: SpywareInWindows SpywareInMacOS SpywareInBIOS SpywareInTelephones 
SpywareIniThings SpywareInAndroid SpywareInElectronicReaders 
SpywareInMobileApps SpywareInSkype SpywareInGames SpywareInEquipment 
SpywareInTVSets SpywareInCameras SpywareInToys SpywareInDrones SpywareAtHome 
SpywareOnWearables SpywareOnSmartWatches SpywareInVehicles SpywareInVR 
SpywareOnTheWeb SpywareInJavaScript SpywareInFlash SpywareInChrome 
SpywareInNetworks
+Targets: SpywareInWindows SpywareInMacOS SpywareInBIOS SpywareInTelephones 
SpywareIniThings SpywareInAndroid SpywareInElectronicReaders 
SpywareInDesktopApps SpywareInMobileApps SpywareInSkype SpywareInGames 
SpywareInEquipment SpywareInTVSets SpywareInCameras SpywareInToys 
SpywareInDrones SpywareAtHome SpywareOnWearables SpywareOnSmartWatches 
SpywareInVehicles SpywareInVR SpywareOnTheWeb SpywareInJavaScript 
SpywareInFlash SpywareInChrome SpywareInNetworks
 
 Page: proprietary-tethers.html
 Targets: proprietary-tethers



reply via email to

[Prev in Thread] Current Thread [Next in Thread]