[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.html proprietar...
From: |
Therese Godefroy |
Subject: |
www/proprietary malware-mobiles.html proprietar... |
Date: |
Sat, 2 Feb 2019 08:13:31 -0500 (EST) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 19/02/02 08:13:31
Modified files:
proprietary : malware-mobiles.html proprietary-sabotage.html
proprietary-surveillance.html proprietary.html
proprietary/workshop: mal.rec targets.rec
Log message:
Spying by Foundry software,
new Desktop Apps subsection in p-surveillance (RT #1345812);
Advertising ID sent to Facebook by Android apps (RT #1354309).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/mal.rec?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/workshop/targets.rec?cvsroot=www&r1=1.4&r2=1.5
Patches:
Index: malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-mobiles.html 28 Jan 2019 08:57:38 -0000 1.75
+++ malware-mobiles.html 2 Feb 2019 13:13:29 -0000 1.76
@@ -364,6 +364,21 @@
tracking people's locations.</p>
</li>
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook.</p>
+
+ <p>Often they send the machine's “advertising ID,” so that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
@@ -895,7 +910,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 08:57:38 $
+$Date: 2019/02/02 13:13:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary-sabotage.html 5 Jan 2019 11:26:11 -0000 1.74
+++ proprietary-sabotage.html 2 Feb 2019 13:13:29 -0000 1.75
@@ -36,6 +36,20 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
@@ -536,7 +550,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:26:11 $
+$Date: 2019/02/02 13:13:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary-surveillance.html 23 Jan 2019 12:57:07 -0000 1.231
+++ proprietary-surveillance.html 2 Feb 2019 13:13:29 -0000 1.232
@@ -95,6 +95,7 @@
</li>
<li><a href="#SpywareInApplications">Spyware in Applications</a>
<ul>
+ <li><a href="#SpywareInDesktopApps">Desktop Apps</a></li>
<li><a href="#SpywareInMobileApps">Mobile Apps</a></li>
<li><a href="#SpywareInSkype">Skype</a></li>
<li><a href="#SpywareInGames">Games</a></li>
@@ -741,6 +742,27 @@
<div style="clear: left;"></div>
<div class="big-subsection">
+ <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
@@ -763,6 +785,21 @@
tracking people's locations.</p>
</li>
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook.</p>
+
+ <p>Often they send the machine's “advertising ID,” so that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
@@ -2029,7 +2066,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/23 12:57:07 $
+$Date: 2019/02/02 13:13:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary.html 28 Jan 2019 08:57:38 -0000 1.71
+++ proprietary.html 2 Feb 2019 13:13:29 -0000 1.72
@@ -144,6 +144,64 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook.</p>
+
+ <p>Often they send the machine's “advertising ID,” so that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook.</p>
+
+ <p>Often they send the machine's “advertising ID,” so that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201901110">
<p>Samsung phones come preloaded with <a
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
@@ -158,43 +216,6 @@
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
are going one step further in their hijacking of users' devices.</p>
</li>
-
- <li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
-
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
- contains these GPS locations.</p>
- </li>
-
- <li id="M201612290">
- <p>In the game Fruit Pop, the player buys boosts with coins to get
- a high score. The player gets coins at the end of each game, and can
- buy more coins with real money.</p>
-
- <p>Getting a higher score once leads the player to desire higher
- score again later. But the higher score resulting from the boost <a
-
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">does
- not give the player more coins, and does not help the player get
- a higher score in subsequent games</a>. To get that, the player
- will need a boost frequently, and usually has to pay real money
- for that. Since boosts are exciting and entertaining, the player is
- subtly pushed to purchase more coins with real money to get boosts,
- and it can develop into a costly habit.</p>
- </li>
-
- <li id="M201612140">
- <p>The Microsoft Telemetry Compatibility service <a
-
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces the performances of machines running
- Windows 10</a>, and can't be disabled easily.</p>
- </li>
-
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
- </li>
</ul>
@@ -255,7 +276,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 08:57:38 $
+$Date: 2019/02/02 13:13:29 $
<!-- timestamp end -->
</p>
</div>
Index: workshop/mal.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/mal.rec,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- workshop/mal.rec 28 Jan 2019 08:57:39 -0000 1.28
+++ workshop/mal.rec 2 Feb 2019 13:13:31 -0000 1.29
@@ -25,6 +25,45 @@
#### Please don't remove the blank line after this marker! ####
# ADD NEW BLURB HERE
+Added: 2019-02-02
+Id: 201812290
+RT: 1354309
+PubDate: 2018-12-29
+Target: proprietary-surveillance.html SpywareInMobileApps
+Target: malware-mobiles.html surveillance
+Keywords: android facebook
+Blurb: <p>Around 40% of gratis Androids apps <a
++
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
++ report on the user's actions to Facebook.</p>
++
++ <p>Often they send the machine's “advertising ID,” so that
++ Facebook can correlate the data it obtains from the same machine via
++ various apps. Some of them send Facebook detailed information about
++ the user's activities in the app; others only say that the user is
++ using that app, but that alone is often quite informative.</p>
++
++ <p>This spying occurs regardless of whether the user has a Facebook
++ account.</p>
+
+Added: 2019-02-02
+Id: 201811020
+RT: 1345812
+PubDate: 2018-11-02
+Target: proprietary-surveillance.html SpywareInDesktopApps
+Target: proprietary-sabotage.html proprietary-sabotage
+Keywords: foundry
+Blurb: <p>Foundry's graphics software <a
++
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
++ reports information to identify who is running it. The result is
++ often a legal threat demanding a lot of money.</p>
++
++ <p>The fact that this is used for repression of forbidden sharing
++ makes it even more vicious.</p>
++
++ <p>This illustrates that making unauthorized copies of nonfree software
++ is not a cure for the injustice of nonfree software. It may avoid
++ paying for the nasty thing, but cannot make it less nasty.</p>
+
Added: 2019-01-28
Id: 201901110
RT: 1350763
Index: workshop/targets.rec
===================================================================
RCS file: /webcvs/www/www/proprietary/workshop/targets.rec,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- workshop/targets.rec 28 Jan 2019 08:57:39 -0000 1.4
+++ workshop/targets.rec 2 Feb 2019 13:13:31 -0000 1.5
@@ -83,7 +83,7 @@
Targets: proprietary-subscriptions
Page: proprietary-surveillance.html
-Targets: SpywareInWindows SpywareInMacOS SpywareInBIOS SpywareInTelephones
SpywareIniThings SpywareInAndroid SpywareInElectronicReaders
SpywareInMobileApps SpywareInSkype SpywareInGames SpywareInEquipment
SpywareInTVSets SpywareInCameras SpywareInToys SpywareInDrones SpywareAtHome
SpywareOnWearables SpywareOnSmartWatches SpywareInVehicles SpywareInVR
SpywareOnTheWeb SpywareInJavaScript SpywareInFlash SpywareInChrome
SpywareInNetworks
+Targets: SpywareInWindows SpywareInMacOS SpywareInBIOS SpywareInTelephones
SpywareIniThings SpywareInAndroid SpywareInElectronicReaders
SpywareInDesktopApps SpywareInMobileApps SpywareInSkype SpywareInGames
SpywareInEquipment SpywareInTVSets SpywareInCameras SpywareInToys
SpywareInDrones SpywareAtHome SpywareOnWearables SpywareOnSmartWatches
SpywareInVehicles SpywareInVR SpywareOnTheWeb SpywareInJavaScript
SpywareInFlash SpywareInChrome SpywareInNetworks
Page: proprietary-tethers.html
Targets: proprietary-tethers
- www/proprietary malware-mobiles.html proprietar...,
Therese Godefroy <=
- www/proprietary malware-mobiles.html proprietar..., Therese Godefroy, 2019/02/02
- www/proprietary malware-mobiles.html proprietar..., Therese Godefroy, 2019/02/03
- www/proprietary malware-mobiles.html proprietar..., Therese Godefroy, 2019/02/08
- www/proprietary malware-mobiles.html proprietar..., Therese Godefroy, 2019/02/08
- www/proprietary malware-mobiles.html proprietar..., Therese Godefroy, 2019/02/11
- www/proprietary malware-mobiles.html proprietar..., Therese Godefroy, 2019/02/13
- www/proprietary malware-mobiles.html proprietar..., Therese Godefroy, 2019/02/20
- www/proprietary malware-mobiles.html proprietar..., Therese Godefroy, 2019/02/28