[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Fri, 22 Feb 2019 09:31:01 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/22 09:31:00
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.378&r2=1.379
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.274&r2=1.275
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.471&r2=1.472
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.32&r2=1.33
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- de.po 22 Feb 2019 11:31:42 -0000 1.32
+++ de.po 22 Feb 2019 14:30:58 -0000 1.33
@@ -2130,11 +2130,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- es.po 22 Feb 2019 11:31:43 -0000 1.42
+++ es.po 22 Feb 2019 14:30:58 -0000 1.43
@@ -1687,11 +1687,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- fr.po 22 Feb 2019 11:31:43 -0000 1.57
+++ fr.po 22 Feb 2019 14:30:58 -0000 1.58
@@ -1686,11 +1686,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- it.po 22 Feb 2019 11:31:43 -0000 1.32
+++ it.po 22 Feb 2019 14:30:58 -0000 1.33
@@ -2074,11 +2074,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- ja.po 22 Feb 2019 11:31:43 -0000 1.32
+++ ja.po 22 Feb 2019 14:30:58 -0000 1.33
@@ -1752,11 +1752,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-appliances.de-diff.html 22 Feb 2019 11:31:43 -0000 1.33
+++ malware-appliances.de-diff.html 22 Feb 2019 14:30:58 -0000 1.34
@@ -66,58 +66,57 @@
here, please write</em></ins></span>
to <span class="removed"><del><strong>make</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
of</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between two users</a>.</p>
- </li>
-
- <li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span class="removed"><del><strong>surveillance
device.</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
-to serve as specific substantiation.</p>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span>
two <span
class="removed"><del><strong>users</a>.</p></strong></del></span>
+<span class="inserted"><ins><em>to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span> <a
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a> which save it
+ permanently.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,
+ is a surveillance device.</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer, based on
the fact
- that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span class="removed"><del><strong>device is
tethered</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="removed"><del><strong>a
server.</p>
+ <p>The article describes wrongdoing by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in</em></ins></span> the
<span class="removed"><del><strong>fact
+ that</strong></del></span> <span class="inserted"><ins><em>own words
of</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>company's
+ CTO, and this data</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>sold</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a> which save</em></ins></span> it <span
class="removed"><del><strong>also demonstrates that</strong></del></span>
- <span class="inserted"><ins><em>permanently.</p>
- </li>
-
- <li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>TV sees,â in</em></ins></span> the <span
class="removed"><del><strong>company
+ <p>But it also demonstrates that the device gives the company
surveillance capability.</p>
</li>
<li>
- <p>A “smart” intravenous pump designed for
- hospitals is connected to</strong></del></span> <span
class="inserted"><ins><em>own words of</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally <a
+ <p>A “smart” intravenous pump
designed</strong></del></span> <span class="inserted"><ins><em>third parties.
This is in return</em></ins></span> for
+ <span class="removed"><del><strong>hospitals</strong></del></span>
+ <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?) and slightly
+ lower retail prices.</p>
+
+ <p>What</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>supposed</em></ins></span> to <span
class="removed"><del><strong>the internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note that</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO, and</em></ins></span> this <span class="removed"><del><strong>article
misuses the term <a
+ <p>Note that</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</strong></del></span> <span class="inserted"><ins><em>data is
sold</em></ins></span> to <span class="removed"><del><strong>crackers.</p>
+ referring to crackers.</p>
</li>
<li>
- <p>The bad security</strong></del></span> <span
class="inserted"><ins><em>third parties. This is</em></ins></span> in <span
class="removed"><del><strong>many Internet of Stings devices
- allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
<span class="inserted"><ins><em>return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>snoop on the people that use
them</a>.</p>
+ <p>The bad security in many Internet of Stings devices
+ allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
<span class="inserted"><ins><em>spying acceptable, according</em></ins></span>
to <span class="removed"><del><strong>snoop on the people that use
them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
- <p>It</strong></del></span> <span class="inserted"><ins><em>make this
spying acceptable, according to him,</em></ins></span>
+ <p>It</strong></del></span> <span
class="inserted"><ins><em>him,</em></ins></span>
is <span class="removed"><del><strong>unfortunate</strong></del></span>
that <span class="inserted"><ins><em>it is opt-in in newer models. But
since</em></ins></span> the <span class="removed"><del><strong>article
uses</strong></del></span> <span class="inserted"><ins><em>Vizio software is
nonfree, we don't know what is actually happening behind</em></ins></span>
the
<span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
@@ -127,457 +126,400 @@
<p>Many models of Internet-connected cameras are tremendously insecure.
They have login accounts with hard-coded passwords, which can't be
changed,</strong></del></span> <span
class="inserted"><ins><em>scenes,</em></ins></span>
- and <span class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</strong></del></span>
<span class="inserted"><ins><em>there</em></ins></span> is no <span
class="removed"><del><strong>way to
- delete these accounts either</a>.</p>
-</li>
-
-<li>
-<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>guarantee</em></ins></span> that <span
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
-medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
-
-<li><p>Users are suing Bose for <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span> <span class="inserted"><ins><em>all future
updates will leave the
+ and <span class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</strong></del></span>
<span class="inserted"><ins><em>there</em></ins></span> is no <span
class="inserted"><ins><em>guarantee that all future updates will leave the
settings unchanged.</p>
- <p>If you already own</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>Vizio smart TV (or any smart TV,</em></ins></span>
for <span class="removed"><del><strong>its headphones</a>.
-Specifically, the app would record the names of the audio files
-users listen to along with the headphone's unique serial number.
-</p>
-
-<p>The suit accuses</strong></del></span> that <span
class="removed"><del><strong>this was done without the users' consent.
-If the fine print of</strong></del></span>
- <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
-would that</strong></del></span> <span class="inserted"><ins><em>easiest way
to</em></ins></span> make <span
class="inserted"><ins><em>sure</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span> <span class="inserted"><ins><em>isn't spying on
you is</em></ins></span>
- to <span class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
-</p>
+ <p>If you already own a Vizio smart TV (or any smart TV, for that
+ matter), the easiest</em></ins></span> way to
+ <span class="removed"><del><strong>delete these accounts
either</a>.</p>
</li>
-<li id="anova">
- <p>Anova sabotaged users' cooking devices with</strong></del></span>
<span class="inserted"><ins><em>get your own router (which can
- be an old computer running completely free software), and set
up</em></ins></span> a <span class="removed"><del><strong>downgrade that
- tethered them</strong></del></span>
- <span class="inserted"><ins><em>firewall to block
connections</em></ins></span> to <span class="inserted"><ins><em>Vizio's
servers. Or, as</em></ins></span> a <span class="removed"><del><strong>remote
server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
- cookers won't function.</a></p></strong></del></span> <span
class="inserted"><ins><em>last resort,
- you can replace your TV with another model.</p></em></ins></span>
+<li>
+<p>The proprietary code that runs pacemakers, insulin
pumps,</strong></del></span> <span class="inserted"><ins><em>make sure it isn't
spying on you is
+ to disconnect it from the Internet,</em></ins></span> and <span
class="removed"><del><strong>other
+medical devices</strong></del></span> <span class="inserted"><ins><em>use a
terrestrial antenna
+ instead. Unfortunately, this</em></ins></span> is <span
class="inserted"><ins><em>not always possible. Another option,
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software), and set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher
is</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span>
+ <li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
+full</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>Internet,
-its security is crap</a>.</p>
-<p>For example,</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>cracker can gain
access to the dishwasher's filesystem,
- infect</strong></del></span> <span class="inserted"><ins><em>better
+ give the manufacturer an unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>gross</strong></del></span> <span
class="inserted"><ins><em>everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>with malware, and force the
dishwasher</strong></del></span> <span class="inserted"><ins><em>suggested that
these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
- other devices</strong></del></span> <span class="inserted"><ins><em>look at
what's</em></ins></span> in the <span class="removed"><del><strong>network.
Since these dishwashers</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's
not</em></ins></span>
+ security <span
class="removed"><del><strong>faults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>for your home. Security means making sure they
don't get to
+ see through your camera.</p></em></ins></span>
</li>
- <li id="M201810150">
- <p>Printer manufacturers</em></ins></span> are <span
class="removed"><del><strong>used in hospitals,
- such attacks could potentially put hundreds</strong></del></span> <span
class="inserted"><ins><em>very innovative—at blocking the
- use</em></ins></span> of <span class="removed"><del><strong>lives at
risk.</p>
-
-</li>
-<li>
-<p>If you buy a used “smart” car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span> <span class="inserted"><ins><em>independent
replacement ink cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely control
it</a>.</p></strong></del></span>
+<span
class="removed"><del><strong><li><p>Users</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810150">
+ <p>Printer manufacturers</em></ins></span> are <span
class="removed"><del><strong>suing Bose for</strong></del></span> <span
class="inserted"><ins><em>very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing a spyware app for its headphones</a>.
+Specifically,</strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p></em></ins></span>
+ HP and Epson have done this</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Vizio</strong></del></span>
- <span class="inserted"><ins><em><li id="M201809260">
- <p>Honeywell's</em></ins></span> “smart” <span
class="inserted"><ins><em>thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just
broadcasts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance,</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>danger of sabotage</a> (of a specific
user, or of
- all users at once), as well as</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>risk of an outage (which</em></ins></span> is <span
class="removed"><del><strong>coming from the user's own
- computer, the TV reports</strong></del></span> what <span
class="removed"><del><strong>it is. The existence of a way to
- disable</strong></del></span>
- <span class="inserted"><ins><em>just happened).</p>
-
- <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>desired temperature
requires running
- nonfree software. With an old-fashioned thermostat, you can
do</em></ins></span> it <span class="removed"><del><strong>was in
- these TVs, does not legitimize</strong></del></span>
- <span class="inserted"><ins><em>using controls right on</em></ins></span>
the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>thermostat.</p></em></ins></span>
+ <li id="M201809260">
+ <p>Honeywell's “smart” thermostats communicate
+ only through</em></ins></span> the <span class="removed"><del><strong>app
would record</strong></del></span> <span class="inserted"><ins><em>company's
server. They have
+ all</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>nasty characteristics</em></ins></span> of <span
class="removed"><del><strong>the audio files</strong></del></span> <span
class="inserted"><ins><em>such devices: <a
+
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance, and danger of sabotage</a> (of a specific user, or of
+ all</em></ins></span> users <span class="removed"><del><strong>listen to
along with the headphone's unique serial number.
+</p>
+
+<p>The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>at once), as well
as</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span
class="inserted"><ins><em>risk</em></ins></span> of <span
class="inserted"><ins><em>an outage (which is what
+ just happened).</p>
+
+ <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>desired
temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can
do</em></ins></span> it <span class="removed"><del><strong>acceptable? No way!
It should be flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal to design</strong></del></span>
+ <span class="inserted"><ins><em>using controls right on</em></ins></span>
the <span class="removed"><del><strong>app to snoop at all</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>thermostat.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
-<p>More or less all “smart” TVs</strong></del></span>
- <span class="inserted"><ins><em><li id="M201809240">
- <p>Researchers have discovered how to</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
+ <li <span class="removed"><del><strong>id="anova">
+ <p>Anova sabotaged users' cooking devices with a
downgrade</strong></del></span> <span
class="inserted"><ins><em>id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so</em></ins></span> that
<span class="inserted"><ins><em>people cannot hear
them, but Alexa and Siri can.</p>
</li>
- <li id="M201807050"></em></ins></span>
- <p>The <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>Jawbone fitness tracker</em></ins></span> was <span
class="removed"><del><strong>as of 2014, but we don't expect this has got
-better.</p>
-
-<p>This shows that laws requiring products</strong></del></span> <span
class="inserted"><ins><em>tethered</em></ins></span> to <span
class="removed"><del><strong>get users' formal
-consent before collecting personal data are totally inadequate. And
-what happens if</strong></del></span> a <span
class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>proprietary phone
- app. In 2017,</em></ins></span> the <span class="removed"><del><strong>TV
will say,
-“Without your consent to tracking,</strong></del></span> <span
class="inserted"><ins><em>company shut down and made</em></ins></span> the
<span class="removed"><del><strong>TV will not
-work.”</p>
-
-<p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>app stop working. <a
+ <li id="M201807050">
+ <p>The Jawbone fitness tracker was</em></ins></span> tethered <span
class="removed"><del><strong>them</strong></del></span> to a <span
class="removed"><del><strong>remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account</strong></del></span> <span
class="inserted"><ins><em>proprietary phone
+ app. In 2017, the company shut down and made the app stop working. <a
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
the existing trackers stopped working forever</a>.</p>
- <p>The article focuses on a further nasty fillip,</em></ins></span>
that <span class="removed"><del><strong>TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>sales of the
- broken devices continued. But I think that is a secondary issue;
- it made the nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>some additional people.
- The fundamental wrong was to design</em></ins></span> the <span
class="inserted"><ins><em>devices to depend on something
- else that didn't respect users' freedom.</p>
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>Anova's servers, their
+ cookers won't function.</a></p>
+</li>
+
+<li>
+<p>When Miele's Internet</strong></del></span> <span
class="inserted"><ins><em>a further nasty fillip, that sales</em></ins></span>
of <span class="removed"><del><strong>Stings hospital disinfectant dishwasher is
+<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> the <span class="removed"><del><strong>Internet,
+its security</strong></del></span>
+ <span class="inserted"><ins><em>broken devices continued. But I think
that</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
+<p>For example,</strong></del></span> a <span
class="removed"><del><strong>cracker can gain access to the dishwasher's
filesystem,
+ infect</strong></del></span> <span class="inserted"><ins><em>secondary
issue;</em></ins></span>
+ it <span class="removed"><del><strong>with malware, and
force</strong></del></span> <span
class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>dishwasher</strong></del></span> <span
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
+ other devices in</strong></del></span> <span class="inserted"><ins><em>some
additional people.
+ The fundamental wrong was to design</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
+ such attacks could potentially put hundreds of lives at
risk.</p></strong></del></span> <span class="inserted"><ins><em>devices
to depend on something
+ else that didn't respect users' freedom.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+<p>If you buy a used “smart” car, house, TV, refrigerator,
+etc.,
+usually</strong></del></span>
- <li id="M201804140">
- <p>A medical insurance company <a
-
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its</em></ins></span>
user <span class="removed"><del><strong>watches — no
exceptions!</p></strong></del></span> <span class="inserted"><ins><em>by
+ <span class="inserted"><ins><em><li id="M201804140">
+ <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+previous owners can still remotely control
it</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
sending usage data back over the
Internet</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804010"></em></ins></span>
- <p>Some <span class="removed"><del><strong>LG</strong></del></span>
<span class="inserted"><ins><em>“Smart”</em></ins></span> TVs <span
class="inserted"><ins><em>automatically</em></ins></span> <a <span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
-tyrants</a>.</p>
-</li>
+<span class="removed"><del><strong><li>
+ <p>Vizio
+ “smart”</strong></del></span>
-<li><a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-Samsung “Smart” TVs have turned Linux into the base
-for</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>tyrant system</a> so as to impose DRM.
-What enables Samsung</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>is viewed on them, and not just broadcasts
+ and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>do this</strong></del></span> <span
class="inserted"><ins><em>the article for the facts it presents.
It</em></ins></span>
- is <span class="inserted"><ins><em>too bad</em></ins></span> that <span
class="removed"><del><strong>Linux is released under
-GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version
3</a>,
-together with a weak interpretation</strong></del></span> <span
class="inserted"><ins><em>the article finishes by advocating the
- moral weakness</em></ins></span> of <span class="removed"><del><strong>GPL
version 2.</strong></del></span> <span class="inserted"><ins><em>surrendering
to Netflix. The Netflix app <a
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>article for the facts it presents.
It</em></ins></span>
+ is <span class="removed"><del><strong>coming from</strong></del></span>
<span class="inserted"><ins><em>too bad that</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>article
finishes by advocating</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>surrendering</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ malware too</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>A company that makes internet-controlled
vibrators</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users in</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely to Apple services</a> by</em></ins></span> being <span
class="removed"><del><strong>sued for collecting lots of personal information
about how
-people use it</a>.</p>
-
-<p>The company's statement that it anonymizes the data may be true,
-but it doesn't really matter. If it sells the data</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>a data broker,</strong></del></span> <span
class="inserted"><ins><em>be incompatible
+ <li id="M201802120">
+ <p>Apple devices lock users in <a
+
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being designed to be incompatible
with all other options, ethical or unethical.</p>
</li>
<li id="M201712240">
- <p>One of</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>dangers
of</em></ins></span> the <span class="removed"><del><strong>user is.</p>
-</li>
+ <p>One of</em></ins></span> the <span
class="removed"><del><strong>surveillance, even</strong></del></span> <span
class="inserted"><ins><em>dangers of the “internet of stings”
+ is that,</em></ins></span> if <span class="removed"><del><strong>it were
not hidden as it was in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>you lose your internet service, you also <a
+
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house and appliances</a>.</p>
-<li>
-<p>Google/Alphabet</strong></del></span> <span
class="inserted"><ins><em>“internet of stings”
- is that, if you lose your internet service, you also</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
-intentionally broke Revolv home automatic</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose</em></ins></span> control <span class="removed"><del><strong>products
that depended on</strong></del></span> <span class="inserted"><ins><em>of your
house and appliances</a>.</p>
-
- <p>For your safety, don't use any appliance with</em></ins></span> a
<span class="removed"><del><strong>server</a></strong></del></span> <span
class="inserted"><ins><em>connection</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't stand for that!
Insist
-on self-contained computers that run free
software!</p></strong></del></span> <span class="inserted"><ins><em>the
- real internet.</p></em></ins></span>
+ <p>For your safety, don't use any appliance with a connection
to</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
+ <span class="inserted"><ins><em>real internet.</p></em></ins></span>
</li>
-
<span class="removed"><del><strong><li>
-<p>ARRIS cable modem</strong></del></span>
+<p>More or less all “smart” TVs</strong></del></span>
<span class="inserted"><ins><em><li id="M201711200">
- <p>Amazon recently invited consumers to be suckers and <a
-
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system</em></ins></span> has a <span
class="inserted"><ins><em>grave security flaw.</p>
+ <p>Amazon recently invited consumers to be suckers
and</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p>
+
+<p>The report was as of 2014, but we don't expect
this</strong></del></span> <span class="inserted"><ins><em>front
doors</a>. Wouldn't you know
+ it, the system</em></ins></span> has <span class="removed"><del><strong>got
+better.</p>
+
+<p>This shows that laws requiring products to get users' formal
+consent before collecting personal data are totally inadequate. And
+what happens if</strong></del></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV will say,
+“Without your consent to tracking, the TV will not
+work.”</p>
+
+<p>Proper laws would say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>grave security flaw.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of</em></ins></span> the
+<span class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
-
<span class="removed"><del><strong><li>
-<p>HP “storage appliances” that use the proprietary
-“Left Hand” operating system have back doors that give
HP</strong></del></span>
+<p>Some LG
+TVs</strong></del></span>
<span class="inserted"><ins><em><li id="M201711080">
<p>Logitech will sabotage
- all Harmony Link household control devices by</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-remote login access</a> to them. HP claims that this does not give HP
-access to</strong></del></span>
+ all Harmony Link household control devices by</em></ins></span> <a
<span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+tyrants</a>.</p>
+</li>
+
+<li><a
+href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
+Samsung “Smart” TVs have turned Linux into</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>server through which</em></ins></span> the
<span class="removed"><del><strong>back door allows
-installation of software changes,</strong></del></span> <span
class="inserted"><ins><em>products' supposed owners
+ turning off</em></ins></span> the <span class="removed"><del><strong>base
+for a tyrant system</a> so as to impose DRM.
+What enables Samsung to do</strong></del></span> <span
class="inserted"><ins><em>server through which the products' supposed owners
communicate with them</a>.</p>
- <p>The owners suspect this is to pressure them to
buy</em></ins></span> a <span class="removed"><del><strong>change could be
installed</strong></del></span> <span class="inserted"><ins><em>newer model. If
- they are wise, they will learn, rather, to distrust any
product</em></ins></span> that
-<span class="removed"><del><strong>would give access</strong></del></span>
- <span class="inserted"><ins><em>requires users</em></ins></span> to <span
class="removed"><del><strong>the customer's data.
-</p></strong></del></span> <span class="inserted"><ins><em>talk with
them through some specialized service.</p></em></ins></span>
+ <p>The owners suspect</em></ins></span> this is <span
class="inserted"><ins><em>to pressure them to buy a newer model. If
+ they are wise, they will learn, rather, to distrust any
product</em></ins></span> that <span class="removed"><del><strong>Linux is
released under
+GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version
3</a>,
+together</strong></del></span>
+ <span class="inserted"><ins><em>requires users to talk</em></ins></span>
with <span class="removed"><del><strong>a weak interpretation of GPL version
2.</strong></del></span> <span class="inserted"><ins><em>them through some
specialized service.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p><a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
-Some D-Link routers</a> have a back door for changing settings
in</strong></del></span>
+<p>A company that makes internet-controlled
vibrators</strong></del></span>
<span class="inserted"><ins><em><li id="M201710040">
<p>Every “home security” camera, if its
- manufacturer can communicate with it, is</em></ins></span> a
-<span class="removed"><del><strong>dlink of an eye.</p>
-
-<p></strong></del></span> <span class="inserted"><ins><em>surveillance
device.</em></ins></span> <a <span
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764">Many
models of routers
-have back doors</a>.</p>
-</li>
-
-<li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router has</strong></del></span>
+ manufacturer can communicate with it, is a surveillance
device.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+being sued for collecting lots of personal information about how
+people use it</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
+ Canary camera is an example</a>.</p></em></ins></span>
- <p>The article describes wrongdoing by the manufacturer, based on
- the fact that the device is tethered to</em></ins></span> a <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>server.</p>
+ <p>The <span class="removed"><del><strong>company's statement that
it anonymizes</strong></del></span> <span class="inserted"><ins><em>article
describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>data may be true,
+but it doesn't really matter. If it sells</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+ the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>fact that the device is tethered</em></ins></span> to
a <span class="removed"><del><strong>data broker,
+the data broker can figure out who</strong></del></span> <span
class="inserted"><ins><em>server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that the device gives the company
+ <p>But it also demonstrates that</em></ins></span> the <span
class="removed"><del><strong>user is.</p></strong></del></span> <span
class="inserted"><ins><em>device gives the company
surveillance capability.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer was</strong></del></span>
+<p>Google/Alphabet</strong></del></span>
<span class="inserted"><ins><em><li id="M201709200">
- <p>A “smart” intravenous pump</em></ins></span>
- designed <span class="removed"><del><strong>with DRM</a>: it won't
accept
-third-party printing materials. It</strong></del></span> <span
class="inserted"><ins><em>for hospitals</em></ins></span> is <span
class="inserted"><ins><em>connected to</em></ins></span> the <span
class="removed"><del><strong>Keurig of printers. Now it is
-being discontinued, which means</strong></del></span> <span
class="inserted"><ins><em>internet. Naturally <a
-
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ <p>A “smart” intravenous pump
+ designed for hospitals is connected to the internet.
Naturally</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+intentionally broke Revolv home automatic control
products</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note</em></ins></span> that <span
class="removed"><del><strong>eventually authorized materials won't
-be available and</strong></del></span> <span class="inserted"><ins><em>this
article misuses</em></ins></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
-
-<p>With a</strong></del></span> <span
class="inserted"><ins><em>term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p>
+ <p>Note</em></ins></span> that <span
class="removed"><del><strong>depended on
+a server</a></strong></del></span> <span class="inserted"><ins><em>this
article misuses the term <a
+
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't stand for that!
Insist
+on self-contained computers that run free
software!</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
</li>
- <li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
+<span class="removed"><del><strong><li>
+<p>ARRIS cable modem has a <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+backdoor</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708280">
+ <p>The bad security</em></ins></span> in <span
class="inserted"><ins><em>many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
-even</strong></del></span> <span class="inserted"><ins><em>people that use
them</a>.</p>
+ to snoop on</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
+</li>
- <p>Don't</em></ins></span> be a <span
class="removed"><del><strong>remote possibility.</p>
+<li>
+<p>HP “storage appliances”</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> that use <span
class="inserted"><ins><em>them</a>.</p>
-<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>author of</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>proprietary
+“Left Hand” operating system have back doors</strong></del></span>
<span class="inserted"><ins><em>stings.</p>
- <p>It is unfortunate</em></ins></span> that <span
class="inserted"><ins><em>the</em></ins></span> article <span
class="removed"><del><strong>says that there was
-“nothing wrong” with designing</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>It is unfortunate</em></ins></span> that <span
class="removed"><del><strong>give HP</strong></del></span> <span
class="inserted"><ins><em>the article uses the term</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a> to them. HP claims that this does not give HP
+access</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li id="M201708230">
<p>Sonos <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”</em></ins></span>
- to <span class="removed"><del><strong>restrict users
in</strong></del></span> <span class="inserted"><ins><em>snooping
or</em></ins></span> the <span class="removed"><del><strong>first place. This
is like putting a “cheat me and mistreat me”
-sign on your chest. We should know better: we should condemn all companies
-that take advantage of people like him. Indeed, it is</strong></del></span>
<span class="inserted"><ins><em>product will stop working</a>. <a
+ to <span class="inserted"><ins><em>snooping or</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if the back door allows
+installation of software changes, a</strong></del></span> <span
class="inserted"><ins><em>product will stop working</a>. <a
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
- Another article</a> says they won't forcibly
change</em></ins></span> the <span class="removed"><del><strong>acceptance of
-their unjust practice that teaches</strong></del></span> <span
class="inserted"><ins><em>software, but</em></ins></span>
- people <span class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>won't</em></ins></span> be <span
class="removed"><del><strong>doormats.</p></strong></del></span> <span
class="inserted"><ins><em>able to get any upgrades and eventually it will
+ Another article</a> says they won't forcibly</em></ins></span>
change <span class="removed"><del><strong>could</strong></del></span> <span
class="inserted"><ins><em>the software, but
+ people won't</em></ins></span> be <span
class="removed"><del><strong>installed that
+would give access</strong></del></span> <span
class="inserted"><ins><em>able</em></ins></span> to <span
class="removed"><del><strong>the customer's data.
+</p></strong></del></span> <span class="inserted"><ins><em>get any
upgrades and eventually it will
stop working.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Philips “smart” lightbulbs <a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
-have been designed not</strong></del></span>
+<p><a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+Some D-Link routers</a> have</strong></del></span>
<span class="inserted"><ins><em><li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>interact with</strong></del></span>
<span class="inserted"><ins><em>snoop on</em></ins></span> other <span
class="removed"><del><strong>companies' smart
-lightbulbs</a>.</p>
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>back door for changing
settings</strong></del></span> <span class="inserted"><ins><em>DJI drone
+ to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>a
+dlink of an eye.</p>
-<p>If a product</strong></del></span> <span
class="inserted"><ins><em>people, DJI</em></ins></span> is <span
class="removed"><del><strong>“smart”,</strong></del></span> <span
class="inserted"><ins><em>in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+<p></strong></del></span> <span class="inserted"><ins><em>many
cases</em></ins></span> <a <span
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764">Many</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
<li id="M201706200">
- <p>Many models of Internet-connected cameras
- are tremendously insecure. They have login
- accounts with hard-coded passwords, which can't be
changed,</em></ins></span> and <span class="removed"><del><strong>you didn't
build it, it</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</em></ins></span>
- is
-<span class="removed"><del><strong>cleverly serving its manufacturer
<em>against you</em>.</p></strong></del></span> <span
class="inserted"><ins><em>no way to delete these accounts
either</a>.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p><a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-DVDs and Bluray disks have DRM</a>.
-</p>
+ <p>Many</em></ins></span> models of <span
class="removed"><del><strong>routers</strong></del></span> <span
class="inserted"><ins><em>Internet-connected cameras
+ are tremendously insecure. They</em></ins></span> have <span
class="removed"><del><strong>back doors</a>.</p>
+</li>
-<p>That page uses spin terms</strong></del></span>
+<li>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router has a backdoor</a>.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201705250">
- <p>The proprietary code</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
-including <a
href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a></strong></del></span> <span
class="inserted"><ins><em>runs pacemakers,
- insulin pumps,</em></ins></span> and <span class="inserted"><ins><em>other
medical devices is</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full of gross
+<li>
+<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer was designed</strong></del></span> <span
class="inserted"><ins><em>login
+ accounts</em></ins></span> with <span
class="removed"><del><strong>DRM</a>: it won't accept
+third-party printing materials. It is the Keurig of printers. Now it is
+being discontinued,</strong></del></span> <span
class="inserted"><ins><em>hard-coded passwords,</em></ins></span> which <span
class="removed"><del><strong>means that eventually authorized materials
won't</strong></del></span> <span
class="inserted"><ins><em>can't</em></ins></span> be <span
class="removed"><del><strong>available</strong></del></span> <span
class="inserted"><ins><em>changed,</em></ins></span> and <span
class="removed"><del><strong>the printers may become unusable.</p>
+
+<p>With a</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts either</a>.</p>
+ </li>
+
+ <li id="M201705250">
+ <p>The proprietary code</em></ins></span> that <span
class="removed"><del><strong>gets the Respects Your Freedom</a>, this
problem would not
+even be</strong></del></span> <span class="inserted"><ins><em>runs pacemakers,
+ insulin pumps, and other medical devices is <a
+ href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
security faults</a>.</p>
</li>
<li id="M201705180">
- <p>Bird</em></ins></span> and <span class="removed"><del><strong>it
claims</strong></del></span> <span class="inserted"><ins><em>rabbit pets were
implemented for Second
- Life by a company</em></ins></span> that <span
class="removed"><del><strong>“artists” (rather than
companies)</strong></del></span> <span class="inserted"><ins><em>tethered their
food to a server. <a
+ <p>Bird and rabbit pets were implemented for Second
+ Life by</em></ins></span> a <span class="removed"><del><strong>remote
possibility.</p>
+
+<p>How pitiful</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> that <span
class="inserted"><ins><em>tethered their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down the server and the pets more or less died</a>.</p>
+ It shut down</em></ins></span> the <span
class="removed"><del><strong>author</strong></del></span> <span
class="inserted"><ins><em>server and the pets more or less
died</a>.</p>
</li>
<li id="M201704190">
- <p>Users</em></ins></span> are
-<span class="removed"><del><strong>primarily responsible</strong></del></span>
<span class="inserted"><ins><em>suing Bose</em></ins></span> for <span
class="removed"><del><strong>putting digital restrictions management into
-these disks. Nonetheless, it is</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Users are suing Bose for <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span
class="removed"><del><strong>reference</strong></del></span> <span
class="inserted"><ins><em>spyware app</em></ins></span> for <span
class="inserted"><ins><em>its headphones</a>.
Specifically,</em></ins></span>
- the <span class="removed"><del><strong>facts.
-</p>
-
-<p>Every Bluray disk (with few, rare exceptions) has DRM—so
-don't use Bluray disks!</p>
-</li>
-
-<li id="cameras-bugs">
-<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>app would record the names</em></ins></span> of <span
class="removed"><del><strong>network-connected surveillance cameras have <a
-href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
-security bugs that allow anyone</strong></del></span> <span
class="inserted"><ins><em>the audio files users listen</em></ins></span> to
<span class="removed"><del><strong>watch through them</a>.</p>
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names</em></ins></span> of <span
class="removed"><del><strong>that article says that there was
+“nothing wrong” with designing</strong></del></span> the <span
class="removed"><del><strong>device to restrict</strong></del></span> <span
class="inserted"><ins><em>audio files</em></ins></span> users <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>listen to
+ along with</em></ins></span> the <span class="removed"><del><strong>first
place. This is like putting a “cheat me and mistreat me”
+sign on your chest. We should know better: we should condemn all
companies</strong></del></span> <span class="inserted"><ins><em>headphone's
unique serial number.</p>
+
+ <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>take advantage of people like him. Indeed, it
is</strong></del></span> <span class="inserted"><ins><em>this was done
without</em></ins></span> the <span
class="removed"><del><strong>acceptance</strong></del></span> <span
class="inserted"><ins><em>users' consent.
+ If the fine print</em></ins></span> of
+<span class="removed"><del><strong>their unjust practice</strong></del></span>
<span class="inserted"><ins><em>the app said</em></ins></span> that <span
class="removed"><del><strong>teaches people to</strong></del></span> <span
class="inserted"><ins><em>users gave consent for this,
+ would that make it acceptable? No way! It should</em></ins></span> be
<span class="removed"><del><strong>doormats.</p>
</li>
<li>
-<p>Samsung's “Smart Home” has a big security hole; <a
-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized people can remotely control it</a>.</p>
-
-<p>Samsung claims</strong></del></span>
- <span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
-
- <p>The suit accuses</em></ins></span> that this <span
class="removed"><del><strong>is an “open” platform
so</strong></del></span> <span class="inserted"><ins><em>was done
without</em></ins></span> the
-<span class="removed"><del><strong>problem is partly</strong></del></span>
<span class="inserted"><ins><em>users' consent.
- If</em></ins></span> the <span
class="removed"><del><strong>fault</strong></del></span> <span
class="inserted"><ins><em>fine print</em></ins></span> of <span
class="inserted"><ins><em>the</em></ins></span> app <span
class="removed"><del><strong>developers. That is clearly true
if</strong></del></span> <span class="inserted"><ins><em>said that users gave
consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to
design</em></ins></span>
- the <span class="removed"><del><strong>apps are proprietary
software.</p>
-
-<p>Anything whose name is “Smart” is most likely
going</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> to
-<span class="removed"><del><strong>screw you.</p></strong></del></span>
<span class="inserted"><ins><em>snoop at
all</a>.</p></em></ins></span>
+<p>Philips “smart” lightbulbs</strong></del></span> <span
class="inserted"><ins><em>flat out</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+have been designed not</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span
class="removed"><del><strong>interact</strong></del></span> <span
class="inserted"><ins><em>design
+ the app to snoop at all</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>
-Malware found on <a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
-security cameras available through Amazon</a>.
-</p>
-
-<p>A camera that records locally on physical media, and has no network
-connection, does not threaten people</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704120">
+ <li id="M201704120">
<p>Anova sabotaged users' cooking devices</em></ins></span>
- with <span class="removed"><del><strong>surveillance—neither
-by watching people through the camera, nor through malware in the
-camera.</p>
+ with <span class="removed"><del><strong>other companies' smart
+lightbulbs</a>.</p>
+
+<p>If</strong></del></span> a <span class="removed"><del><strong>product
is “smart”, and you didn't build it, it is
+cleverly serving its manufacturer <em>against you</em>.</p>
</li>
<li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit fitness trackers have</strong></del></span> a <span
class="removed"><del><strong>Bluetooth
vulnerability</a></strong></del></span> <span
class="inserted"><ins><em>downgrade</em></ins></span> that <span
class="removed"><del><strong>allows
-attackers</strong></del></span> <span class="inserted"><ins><em>tethered
them</em></ins></span> to <span class="removed"><del><strong>send
malware</strong></del></span> <span class="inserted"><ins><em>a remote server.
<a
-
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless
+<p><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+DVDs and Bluray disks have DRM</a>.
+</p>
+
+<p>That page uses spin terms</strong></del></span> <span
class="inserted"><ins><em>downgrade</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>tethered them
to a remote server.</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+digital “rights” management</a>
+and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless
users create an account on Anova's servers, their cookers won't
function</a>.</p>
</li>
<li id="M201703270">
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is <a
-
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected</em></ins></span> to the <span
class="removed"><del><strong>devices, which</strong></del></span> <span
class="inserted"><ins><em>Internet, its security is crap</a>.</p>
+ Stings hospital disinfectant dishwasher is</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to the Internet, its security is crap</a>.</p>
- <p>For example, a cracker</em></ins></span> can <span
class="removed"><del><strong>subsequently
-spread</strong></del></span> <span class="inserted"><ins><em>gain
access</em></ins></span> to <span
class="removed"><del><strong>computers</strong></del></span> <span
class="inserted"><ins><em>the dishwasher's
+ <p>For example, a cracker can gain access to the dishwasher's
filesystem, infect it with malware,</em></ins></span> and <span
class="inserted"><ins><em>force the dishwasher to launch
- attacks on</em></ins></span> other <span
class="removed"><del><strong>FitBit trackers that interact with
-them.</p>
-</li>
-
-<li>
-<p> “Self-encrypting” disk drives do</strong></del></span>
<span class="inserted"><ins><em>devices in</em></ins></span> the <span
class="removed"><del><strong>encryption with
-proprietary firmware so you can't trust it. Western Digital's <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
-“My Passport” drives have a back door</a>.</p>
-</li>
-
-<li>
-<p>
-Hospira infusion pumps, which</strong></del></span> <span
class="inserted"><ins><em>network. Since these dishwashers</em></ins></span> are
- used <span class="removed"><del><strong>to administer drugs to
-a patient, were rated “<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
-least secure IP device I've ever seen</a>”</strong></del></span>
<span class="inserted"><ins><em>in hospitals, such attacks could potentially
put hundreds of
+ attacks on other devices in the network. Since these dishwashers are
+ used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
@@ -587,145 +529,76 @@
was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded</em></ins></span> by a
<span class="removed"><del><strong>security
-researcher.</p>
-
-<p>Depending on what drug is being infused,</strong></del></span> <span
class="inserted"><ins><em>person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>vibration
frequency.</p>
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>claims that “artists”
(rather</strong></del></span> <span class="inserted"><ins><em>was surrounded by
a person's
+ body), as well as the vibration frequency.</p>
- <p>Note</em></ins></span> the <span
class="removed"><del><strong>door to murder.</p>
-</li>
-
-<li>
-<p>Due to bad security in</strong></del></span> <span
class="inserted"><ins><em>totally inadequate proposed
response:</em></ins></span> a <span class="removed"><del><strong>drug pump,
crackers</strong></del></span> <span class="inserted"><ins><em>labeling
+ <p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users</em></ins></span> could
<span class="removed"><del><strong>use it to <a
-href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
-kill patients</a>.</p>
-</li>
-
-<li>
-<p><a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out to be stupidly vulnerable to
-intrusion.</p>
-</li>
-
-<li></strong></del></span> <span class="inserted"><ins><em>have checked
- and changed.</p></em></ins></span>
+ products, rather</em></ins></span> than <span
class="removed"><del><strong>companies) are
+primarily responsible</strong></del></span> <span
class="inserted"><ins><em>free software which users could have checked
+ and changed.</p>
- <p>The <span class="removed"><del><strong><a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-FTC punished a</strong></del></span> company <span
class="inserted"><ins><em>that made the vibrator <a
+ <p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</em></ins></span> for <span class="removed"><del><strong>making
webcams with bad security</a> so</strong></del></span> <span
class="inserted"><ins><em>collecting lots of personal information about how
people
+ was sued</em></ins></span> for <span class="removed"><del><strong>putting
digital restrictions management into</strong></del></span> <span
class="inserted"><ins><em>collecting lots of personal information about how
people
used it</a>.</p>
- <p>The company's statement</em></ins></span> that it was <span
class="removed"><del><strong>easy for anyone</strong></del></span> <span
class="inserted"><ins><em>anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="removed"><del><strong>watch
them.</p>
-</li>
-
-<li>
-<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>a data
- broker, the data broker would have been able</em></ins></span> to <span
class="inserted"><ins><em>figure out who the
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit,</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-kill people by taking control</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total</em></ins></span> of <span
class="removed"><del><strong>medical implants by radio</a>. More
-information in <a
-href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
-<a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p></strong></del></span> <span
class="inserted"><ins><em>C$4m</a> to its
- customers.</p></em></ins></span>
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Lots of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a
-<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>, and it can be fatal.</p>
-</li>
-
-<li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken over</a> and turned
-into a botnet for</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>purpose of collecting customers' credit card
-numbers.</p></strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p>
+ <p>That the manufacturer and the FBI could listen
to</em></ins></span> these <span class="removed"><del><strong>disks.
Nonetheless,</strong></del></span>
+ <span class="inserted"><ins><em>conversations was unacceptable by
itself.</p>
</li>
<li id="M201702200">
<p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
- previous owners can still remotely control
it</a>.</p></em></ins></span>
+ previous owners can still remotely control it</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="vizio-snoop"></strong></del></span> <span
class="inserted"><ins><em>id="M201702060"></em></ins></span>
- <p>Vizio <span
class="inserted"><ins><em>“smart”</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
-used a firmware “upgrade” to make its TVs
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</em></ins></span> on <span
class="inserted"><ins><em>them, and not just broadcasts and
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
- the TV reports</em></ins></span> what
-<span class="removed"><del><strong>users
watch</a>.</strong></del></span> <span class="inserted"><ins><em>it
is.</em></ins></span> The <span class="removed"><del><strong>TVs
did</strong></del></span> <span class="inserted"><ins><em>existence of a way to
disable the
- surveillance, even if it were</em></ins></span> not <span
class="removed"><del><strong>do that when first sold.</p>
-</li>
-
-<li>
-<p>LG <a
-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
-disabled network features</a> on <em>previously
purchased</em>
-“smart”</strong></del></span> <span
class="inserted"><ins><em>hidden as it was in these</em></ins></span> TVs,
<span class="removed"><del><strong>unless</strong></del></span>
- <span class="inserted"><ins><em>does not legitimize</em></ins></span> the
<span class="removed"><del><strong>purchasers agreed to let LG
-begin to snoop on them and distribute their personal
data.</p></strong></del></span> <span
class="inserted"><ins><em>surveillance.</p></em></ins></span>
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
-Barbie is going</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612230">
+ <li id="M201612230">
<p>VR equipment, measuring every slight motion,
creates the potential for the most intimate
- surveillance ever. All it takes</em></ins></span> to <span
class="removed"><del><strong>spy</a></strong></del></span> <span
class="inserted"><ins><em>make this potential real <a
+ surveillance ever. All it takes to make this potential real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
page</a>.</p>
<p>You can bet Facebook will implement the maximum possible
- surveillance</em></ins></span> on <span
class="removed"><del><strong>children and adults.</p>
-</li>
-
-<li>
-<p><a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-Cisco TNP IP phones are spying
devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Oculus Rift devices. The moral is, never trust a VR
- system with nonfree software in it.</p></em></ins></span>
+ surveillance on Oculus Rift devices. The moral is, never trust a VR
+ system with nonfree software in it.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612200"></em></ins></span>
- <p>The <span class="inserted"><ins><em>developer of Ham Radio
Deluxe</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">Nest
Cam</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged
+ <li id="M201612200">
+ <p>The developer of Ham Radio Deluxe <a
+
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged
a customer's installation as punishment for posting a negative
review</a>.</p>
@@ -735,88 +608,59 @@
</li>
<li id="M201612060.1">
- <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>camera</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que can be <a
+ <p>The “smart” toys My Friend Cayla and i-Que can be
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
- controlled with a mobile phone</a>; physical
access</em></ins></span> is <span class="removed"><del><strong>always
watching</a>,</strong></del></span> <span class="inserted"><ins><em>not
+ controlled with a mobile phone</a>; physical access is not
necessary. This would enable crackers to listen in on a child's
- conversations, and</em></ins></span> even <span
class="removed"><del><strong>when</strong></del></span> <span
class="inserted"><ins><em>speak into</em></ins></span> the
-<span class="removed"><del><strong>“owner” switches it
“off.”</p>
-
-<p>A “smart” device</strong></del></span> <span
class="inserted"><ins><em>toys themselves.</p>
+ conversations, and even speak into the toys themselves.</p>
- <p>This</em></ins></span> means <span
class="removed"><del><strong>the manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>a burglar could speak into the toys and ask the
child</em></ins></span>
- to <span class="removed"><del><strong>outsmart
-you.</p></strong></del></span> <span class="inserted"><ins><em>unlock
the front door while Mommy's not looking.</p></em></ins></span>
+ <p>This means a burglar could speak into the toys and ask the child
+ to unlock the front door while Mommy's not looking.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609200">
+ <li id="M201609200">
<p>HP's firmware downgrade <a
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
- DRM</em></ins></span> on
-<span class="removed"><del><strong>their users: their</strong></del></span>
<span class="inserted"><ins><em>some printers, which now refuse to function
with third-party
+ DRM on some printers, which now refuse to function with third-party
ink cartridges</a>.</p>
</li>
<li id="M201608080">
- <p>Ransomware</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
-“smart” TVs analyze your viewing habits in detail and
-link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
- has been developed for a thermostat</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> <span
class="inserted"><ins><em>uses proprietary
+ <p>Ransomware <a
+
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
+ has been developed for a thermostat that uses proprietary
software</a>.</p>
</li>
<li id="M201605020">
<p>Samsung's “Smart Home” has a big security hole; <a
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
- unauthorized people</em></ins></span> can <span
class="removed"><del><strong>track you
-across devices.</p>
+ unauthorized people can remotely control it</a>.</p>
-<p>It is possible to turn</strong></del></span> <span
class="inserted"><ins><em>remotely control it</a>.</p>
-
- <p>Samsung claims that</em></ins></span> this <span
class="removed"><del><strong>off, but having it enabled by
default</strong></del></span> is an <span
class="removed"><del><strong>injustice already.</p>
-</li>
-
-<li>
-<p>Tivo's alliance with Viacom adds 2.3 million households
to</strong></del></span> <span class="inserted"><ins><em>“open”
platform so</em></ins></span> the <span class="removed"><del><strong>600
-millions social media profiles</strong></del></span>
- <span class="inserted"><ins><em>problem is partly</em></ins></span> the
<span class="removed"><del><strong>company already monitors. Tivo
-customers</strong></del></span> <span class="inserted"><ins><em>fault of app
developers. That is clearly true
- if the apps</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by advertisers. By
-combining TV viewing information with online social media
-participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>proprietary software.</p>
+ <p>Samsung claims that this is an “open” platform so the
+ problem is partly the fault of app developers. That is clearly true
+ if the apps are proprietary software.</p>
<p>Anything whose name is “Smart” is most likely going
to screw you.</p>
</li>
<li id="M201604110">
- <p>Malware was found on</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
-correlate TV advertisement</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+ <p>Malware was found on <a
+
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.</p>
<p>A camera that records locally on physical media, and has no
network
- connection, does not threaten people</em></ins></span> with <span
class="removed"><del><strong>online purchases</a>, exposing all
-users to new combined surveillance</strong></del></span> <span
class="inserted"><ins><em>surveillance—neither</em></ins></span>
- by <span
class="removed"><del><strong>default.</p></strong></del></span> <span
class="inserted"><ins><em>watching people through the camera, nor through
malware in the
- camera.</p></em></ins></span>
+ connection, does not threaten people with surveillance—neither
+ by watching people through the camera, nor through malware in the
+ camera.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201604050">
+ <li id="M201604050">
<p>Google/Alphabet <a
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
intentionally broke Revolv home automatic control products that
- depended on a server</a></em></ins></span> to <span
class="removed"><del><strong>be picked
-up</strong></del></span> <span
class="inserted"><ins><em>function,</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running</strong></del></span>
<span class="inserted"><ins><em>shutting down the server.
+ depended on a server</a> to function, by shutting down the server.
The lesson is, reject all such products. Insist on self-contained
computers that run free software!</p>
</li>
@@ -857,35 +701,50 @@
later the company updated the firmware to disallow
interoperability</a>.</p>
- <p>If a product is “smart”, and you didn't build it,
- it is cleverly serving its manufacturer <em>against
you</em>.</p>
+ <p>If a product is “smart”, and you didn't build
it,</em></ins></span>
+ it is <span class="inserted"><ins><em>cleverly serving its manufacturer
<em>against you</em>.</p>
</li>
<li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have a back door for changing settings in a
+ Some D-Link routers</a> have</em></ins></span> a <span
class="removed"><del><strong>reference</strong></del></span> <span
class="inserted"><ins><em>back door</em></ins></span> for <span
class="removed"><del><strong>the facts.
+</p>
+
+<p>Every Bluray disk (with few, rare exceptions)</strong></del></span>
<span class="inserted"><ins><em>changing settings in a
dlink of an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router has a back door</a>.</p>
+ router</em></ins></span> has <span
class="removed"><del><strong>DRM—so
+don't use Bluray disks!</p>
+</li>
- <p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
- routers have back doors</a>.</p>
+<li id="cameras-bugs">
+<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>a back door</a>.</p>
+
+ <p><a href="https://github.com/elvanderb/TCP-32764">Many
models</em></ins></span> of <span
class="removed"><del><strong>network-connected surveillance
cameras</strong></del></span>
+ <span class="inserted"><ins><em>routers</em></ins></span> have <span
class="inserted"><ins><em>back doors</a>.</p>
</li>
<li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ <p>The Nest Cam “smart” camera is</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+security bugs that allow anyone</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ to <span class="removed"><del><strong>watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
- <li id="M201511198">
- <p>ARRIS cable modem has a <a
-
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+<span class="removed"><del><strong><li>
+<p>Samsung's “Smart Home”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511198">
+ <p>ARRIS cable modem</em></ins></span> has a <span
class="removed"><del><strong>big security hole;</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized people</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
back door in the back door</a>.</p>
</li>
@@ -894,7 +753,9 @@
sounds to be picked up by proprietary malware running
on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely control it</a>.</p>
+
+<p>Samsung claims</strong></del></span> <span
class="inserted"><ins><em>correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -904,78 +765,155 @@
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
+ link them your IP address</a> so</em></ins></span> that <span
class="inserted"><ins><em>advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p>
+ <p>It is possible to turn</em></ins></span> this <span
class="inserted"><ins><em>off, but having it enabled by
default</em></ins></span>
+ is an <span class="removed"><del><strong>“open” platform so the
+problem is partly</strong></del></span> <span
class="inserted"><ins><em>injustice already.</p>
</li>
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
- already monitors. Tivo customers are unaware they're
+ to</em></ins></span> the <span class="removed"><del><strong>fault of app
developers. That is clearly true if</strong></del></span> <span
class="inserted"><ins><em>600 millions social media profiles</em></ins></span>
the <span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>company
+ already monitors. Tivo customers</em></ins></span> are <span
class="removed"><del><strong>proprietary software.</p>
+
+<p>Anything whose name is “Smart” is most likely going to
+screw you.</p>
+</li>
+
+<li>
+<p>
+Malware found on</strong></del></span> <span class="inserted"><ins><em>unaware
they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ information with online social media participation, Tivo can
now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+security cameras available through Amazon</a>.
+</p>
+
+<p>A camera that records locally on physical media, and has no network
+connection, does not threaten people</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement</em></ins></span> with <span
class="removed"><del><strong>surveillance—neither</strong></del></span>
<span class="inserted"><ins><em>online purchases</a>, exposing all
+ users to new combined surveillance</em></ins></span> by <span
class="removed"><del><strong>watching people through the camera, nor through
malware in the
+camera.</p></strong></del></span> <span
class="inserted"><ins><em>default.</p></em></ins></span>
</li>
- <li id="M201510210">
- <p>FitBit fitness trackers have a <a
-
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+<span class="removed"><del><strong><li>
+<p> <a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+FitBit</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510210">
+ <p>FitBit</em></ins></span> fitness trackers have a <span
class="inserted"><ins><em><a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></em></ins></span>
Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with them.</p>
</li>
- <li id="M201510200">
- <p>“Self-encrypting” disk drives
+<span class="removed"><del><strong><li>
+<p> “Self-encrypting”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510200">
+ <p>“Self-encrypting”</em></ins></span> disk drives
do the encryption with proprietary firmware so you
- can't trust it. Western Digital's “My Passport” drives <a
-
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ can't trust it. Western Digital's <span class="removed"><del><strong><a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"></strong></del></span>
“My Passport” drives <span class="inserted"><ins><em><a
+
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"></em></ins></span>
have a back door</a>.</p>
</li>
- <li id="M201507240">
+<span class="removed"><del><strong><li>
+<p>
+Hospira infusion pumps, which</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ what people</em></ins></span> are <span class="removed"><del><strong>used
to administer drugs to
+a patient, were rated “<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
+least secure IP device I've ever seen</a>”
by</strong></del></span> <span class="inserted"><ins><em>watching</a>,
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
+researcher.</p>
+
+<p>Depending on what drug is being infused, the insecurity could
+open the door to murder.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
</li>
- <li id="M201506080">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506080"></em></ins></span>
<p>Due to bad security in a drug pump, crackers could use it to <a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
kill patients</a>.</p>
</li>
- <li id="M201505290">
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“Smart homes”</a> turn out to be stupidly vulnerable to
+intrusion.</p>
+</li>
+
+<li>
+<p>The <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+FTC punished a company for making webcams with bad security</a> so
+that it was easy for anyone to watch them.</p>
+</li>
+
+<li>
+<p>It is possible to <a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+kill people by taking control of medical implants by radio</a>. More
+information in <a
+href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
+<a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+IOActive Labs Research blog</a>.</p>
+</li>
+
+<li>
+<p>Lots of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+hospital equipment has lousy security</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>it can be fatal.</p></strong></del></span>
<span class="inserted"><ins><em>even what they wanted to
+ record</a>.</p></em></ins></span>
</li>
- <li id="M201505050">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505050">
<p>Hospira infusion pumps, which are used
- to administer drugs to a patient, were rated “<a
+ to administer drugs to a patient,</em></ins></span> were <span
class="removed"><del><strong>taken over</a> and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated “<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
- secure IP device I've ever seen</a>” by a security
+ secure IP device I've ever seen</a>” by</em></ins></span> a
<span class="removed"><del><strong>botnet for</strong></del></span> <span
class="inserted"><ins><em>security
researcher.</p>
- <p>Depending on what drug is being infused, the insecurity could open
- the door to murder.</p>
+ <p>Depending on what drug is being infused,</em></ins></span> the
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.</p></strong></del></span> <span
class="inserted"><ins><em>insecurity could open
+ the door to murder.</p></em></ins></span>
</li>
- <li id="M201504300">
+ <li <span
class="removed"><del><strong>id="vizio-snoop"></strong></del></span> <span
class="inserted"><ins><em>id="M201504300"></em></ins></span>
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <li id="M201502180">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
@@ -1027,7 +965,7 @@
data about the user</a>.</p>
</li>
- <li id="M201405200.1">
+ <li id="M201405200.1"></em></ins></span>
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously
purchased</em>
@@ -1035,35 +973,80 @@
to snoop on them and distribute their personal data.</p>
</li>
- <li id="M201404250">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
+Barbie is going to spy</a> on children</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201404250">
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p>
+ hospital equipment has lousy security</a>,</em></ins></span> and
<span class="removed"><del><strong>adults.</p></strong></del></span>
<span class="inserted"><ins><em>it can be fatal.</p></em></ins></span>
</li>
- <li id="M201312290">
- <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312290"></em></ins></span>
+ <p><a
+<span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+Cisco TNP IP phones are spying devices</a>.</p>
+</li>
+
+<li>
+<p>The <a
+href="http://www.bbc.com/news/technology-34922712">Nest Cam
+“smart” camera is always watching</a>, even when the
+“owner” switches</strong></del></span> <span
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554">
Some flash
memories have modifiable software</a>, which makes them vulnerable
to viruses.</p>
- <p>We don't call this a “back door” because it is normal
- that you can install a new system in a computer, given physical access
- to it. However, memory sticks and cards should not be modifiable in
- this way.</p>
+ <p>We don't call this a “back door”
because</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+
+<p>A “smart” device means the
manufacturer</strong></del></span> is <span class="removed"><del><strong>using
it</strong></del></span> <span class="inserted"><ins><em>normal
+ that you can install a new system in a computer, given physical
access</em></ins></span>
+ to <span class="removed"><del><strong>outsmart
+you.</p></strong></del></span> <span class="inserted"><ins><em>it.
However, memory sticks and cards should not be modifiable in
+ this way.</p></em></ins></span>
</li>
- <li id="M201312040">
+<span class="removed"><del><strong><li>
+<p>Vizio goes</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312040">
<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
Point-of-sale terminals running Windows were taken over</a> and
- turned into a botnet for the purpose of collecting customers' credit
+ turned into</em></ins></span> a <span class="removed"><del><strong>step
further than other TV manufacturers</strong></del></span> <span
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
card numbers.</p>
</li>
<li id="M201311210">
- <p>Spyware in LG “smart” TVs <a
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>spying on
+their users: their <a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>LG</em></ins></span> “smart” TVs
<span class="removed"><del><strong>analyze your viewing habits in
detail</strong></del></span> <span class="inserted"><ins><em><a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
+ reports what the user watches,</em></ins></span> and
+<span class="removed"><del><strong>link them your IP address</a> so that
advertisers can track you
+across devices.</p>
+
+<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span
class="removed"><del><strong>off, but having it enabled by default
+is an injustice already.</p>
+</li>
+
+<li>
+<p>Tivo's alliance with Viacom adds 2.3 million households to the 600
+millions social media profiles the company already monitors. Tivo
+customers are unaware they're being watched by advertisers. By
+combining TV viewing information with online social media
+participation, Tivo can now <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+correlate TV advertisement with online purchases</a>, exposing all
+users to new combined surveillance by default.</p>
+</li>
+
+<li>
+<p>Some web and TV advertisements play inaudible sounds to be picked
+up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
@@ -1272,7 +1255,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:43 $
+$Date: 2019/02/22 14:30:58 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- malware-appliances.de.po 22 Feb 2019 11:31:43 -0000 1.67
+++ malware-appliances.de.po 22 Feb 2019 14:30:58 -0000 1.68
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -115,11 +115,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- malware-appliances.fr.po 22 Feb 2019 11:31:43 -0000 1.106
+++ malware-appliances.fr.po 22 Feb 2019 14:30:58 -0000 1.107
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2019-02-10 16:42+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -94,11 +94,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- malware-appliances.pot 22 Feb 2019 11:31:43 -0000 1.52
+++ malware-appliances.pot 22 Feb 2019 14:30:58 -0000 1.53
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -71,12 +71,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs "
-"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
"
-"collect âwhatever the TV sees,â in the own words of the company's CTO,
and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
+"Vizio TVs <a "
+"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\">
"
+"collect “whatever the TV sees,”</a> in the own words of the "
+"company's CTO, and this data is sold to third parties. This is in return for "
+"“better service” (meaning more intrusive ads?) and slightly "
+"lower retail prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- malware-appliances.ru.po 22 Feb 2019 11:31:43 -0000 1.138
+++ malware-appliances.ru.po 22 Feb 2019 14:30:58 -0000 1.139
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -95,11 +95,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- nl.po 22 Feb 2019 11:31:43 -0000 1.32
+++ nl.po 22 Feb 2019 14:30:58 -0000 1.33
@@ -1725,11 +1725,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- pl.po 22 Feb 2019 11:31:43 -0000 1.32
+++ pl.po 22 Feb 2019 14:30:58 -0000 1.33
@@ -1292,11 +1292,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- pot 22 Feb 2019 11:31:44 -0000 1.32
+++ pot 22 Feb 2019 14:30:58 -0000 1.33
@@ -1162,11 +1162,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-surveillance.de-diff.html 22 Feb 2019 11:31:44 -0000
1.45
+++ proprietary-surveillance.de-diff.html 22 Feb 2019 14:30:59 -0000
1.46
@@ -712,12 +712,13 @@
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>still counts as a
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed that the non-premium version</strong></del></span> <span
class="inserted"><ins><em>still counts as a
surveillance functionality.</p>
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
+ nude photos</em></ins></span> of <span class="inserted"><ins><em>many
celebrities</a>. They needed to break Apple's
security to get at them, but NSA can access any of them through <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
@@ -725,7 +726,8 @@
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>app does
+ JavaScript injection</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
<p>This may have improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
@@ -737,8 +739,8 @@
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
+ Several “features” of iOS seem to exist</em></ins></span>
+ for <span class="removed"><del><strong>tracking</strong></del></span>
<span class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here is the <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
@@ -746,21 +748,23 @@
<li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p>
- </li>
-
- <li id="M201312300">
- <p><a
-
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
+ iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span class="removed"><del><strong>display
ads.</dd>
+ </dl></strong></del></span>
+ <span class="inserted"><ins><em>get other info
too.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312300"></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop on all the data</em></ins></span> in
<span class="removed"><del><strong>2015</a> found</strong></del></span>
<span class="inserted"><ins><em>an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
+ tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>90% of the
top-ranked</strong></del></span> <span class="inserted"><ins><em>can be
turned off.</p>
</li>
@@ -774,7 +778,8 @@
<li id="M201204280">
<p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
- to install even gratis apps</a>) without giving a valid
+ to install even</em></ins></span> gratis
+ <span class="removed"><del><strong>proprietary</strong></del></span> <span
class="inserted"><ins><em>apps</a>) without giving a valid
email address and receiving the verification code Apple sends
to it.</p>
</li>
@@ -790,7 +795,7 @@
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
+ upload call logs automatically from</em></ins></span> Android <span
class="removed"><del><strong>apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>phones</a>
while disguising
what the “consent” was for.</p>
</li>
@@ -813,39 +818,63 @@
tracks the users' movements without their permission</a>.</p>
<p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
+ disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>tracking.
This is
+ yet another example</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>nonfree
software pretending to obey</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ unthinkable with free software.</p></em></ins></span>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make
sure</em></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</em></ins></span>
+ that <span class="inserted"><ins><em>users can't delete</a>,
and</em></ins></span> they <span class="removed"><del><strong>don't
snoop.</p>
+ <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>send so much data</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some kind.</p>
+ of some kind.</p></em></ins></span>
</li>
- <li id="M201403120">
+<span class="removed"><del><strong><li>
+ <p>A study found 234</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the
system.</p>
</li>
<li id="M201308010">
- <p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps that track users</strong></del></span> <span
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us</em></ins></span> by <span
class="inserted"><ins><em>a paywall) reports that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone</em></ins></span> in
<span class="removed"><del><strong>stores or played by TV programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs of</strong></del></span> Android <span
class="removed"><del><strong>apps can collude to transmit users' personal
+ data to servers.</strong></del></span> <span
class="inserted"><ins><em>phones
+ and laptops</a>. (I suspect this means Windows laptops.) Here
is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
<li id="M201307280">
<p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android that <a
+ by Google, use a modified version</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>Android</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p></strong></del></span>
<span class="inserted"><ins><em><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
sends personal data to Motorola</a>.</p>
</li>
@@ -853,28 +882,32 @@
<li id="M201307250">
<p>A Motorola phone <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ listens for voice all the time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150"></em></ins></span>
<p>Google Play intentionally sends app developers <a
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent”</em></ins></span> of
<span class="inserted"><ins><em>users is not enough to
- legitimize actions like this. At</em></ins></span> this <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>point, most users</em></ins></span> have
- <span class="removed"><del><strong>confirmed</strong></del></span> <span
class="inserted"><ins><em>stopped
- reading the “Terms and Conditions”</em></ins></span> that
<span class="inserted"><ins><em>spell out what
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>non-premium version</strong></del></span> <span
class="inserted"><ins><em>information it collects on users,
instead</em></ins></span> of
- <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information
in</em></ins></span> the <span class="removed"><del><strong>app
does</strong></del></span>
- <span class="inserted"><ins><em>first place!</p>
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
- <li id="M201111170">
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201111170">
<p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier IQ</a>.</p>
@@ -889,31 +922,25 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain</em></ins></span> JavaScript <span
class="removed"><del><strong>injection for tracking</strong></del></span> <span
class="inserted"><ins><em>code,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em><a
+ <p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ sometimes this code snoops on readers</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>paid proprietary apps, it was only
60%.</p>
- <p>The article confusingly describes gratis apps as “free”,
- but</strong></del></span> <span class="inserted"><ins><em>e-reader used
by</em></ins></span> most <span class="inserted"><ins><em>US libraries, <a
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of <span class="removed"><del><strong>them are
not</strong></del></span> <span class="inserted"><ins><em>data to
Adobe</a>. Adobe's “excuse”: it's
+ send lots</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>data to Adobe</a>. Adobe's
“excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses</strong></del></span>
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement</strong></del></span> <span class="inserted"><ins><em>user reads at
what time</a>.</p>
+ report even which page the user reads at what time</a>.</p>
</li>
</ul>
@@ -937,25 +964,14 @@
reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact that this is used</em></ins></span> for <span
class="inserted"><ins><em>repression of forbidden sharing
+ <p>The fact that this is used for repression of forbidden sharing
makes it even more vicious.</p>
- <p>This illustrates</em></ins></span> that <span
class="removed"><del><strong>word</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
- is <span class="removed"><del><strong>“exploit”; nearly always
that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps</strong></del></span> <span class="inserted"><ins><em>not a
cure</em></ins></span> for <span class="removed"><del><strong>BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>the
injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -964,54 +980,46 @@
<ul class="blurbs">
<li id="M201902060">
- <p>Many nonfree</em></ins></span> apps <span
class="removed"><del><strong>that track users by</strong></del></span> <span
class="inserted"><ins><em>have a surveillance feature for</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>stores or played by TV programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
- <p>Pairs of Android</strong></del></span>
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera”</em></ins></span> apps
<span class="removed"><del><strong>can collude to transmit users' personal
- data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs</strong></del></span> that <span
class="removed"><del><strong>collude</a>.</p>
-</li>
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable</strong></del></span> <span
class="inserted"><ins><em>actions</a> in interacting with the
app.</p>
+ </li>
-<li>
-<p>Google</strong></del></span> <span class="inserted"><ins><em>used to
- be on Google</em></ins></span> Play <span
class="removed"><del><strong>intentionally sends app
developers</strong></del></span> <span class="inserted"><ins><em>had one or
more malicious functionalities, such as</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on</em></ins></span> Google Play <span
class="removed"><del><strong>itself</strong></del></span> <span
class="inserted"><ins><em>had one or more malicious functionalities, such as
<a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span
class="removed"><del><strong>“consent”</strong></del></span> <span
class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>users is not enough
-to legitimize actions like this. At this point,</strong></del></span> most
<span class="removed"><del><strong>users have
-stopped reading the “Terms and Conditions” that spell out
-what</strong></del></span> <span class="inserted"><ins><em>of them was
designed to make uninstallation
+ them</em></ins></span> to <span class="removed"><del><strong>completely
stop</strong></del></span> <span class="inserted"><ins><em>phishing sites that
stole their credentials. Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>tracking. This is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>most of them was designed</em></ins></span> to
<span class="removed"><del><strong>obey the user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to.
Google</strong></del></span> should <span class="removed"><del><strong>clearly
-and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>also stay away
from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way</em></ins></span> of <span
class="removed"><del><strong>hiding it</strong></del></span> <span
class="inserted"><ins><em>knowing what they really do.</p>
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps</em></ins></span> in <span class="removed"><del><strong>an
obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span class="inserted"><ins><em>Google
Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span
class="removed"><del><strong>truly</strong></del></span> protect <span
class="removed"><del><strong>people's privacy, we must prevent Google
-and other companies from getting this personal
information</strong></del></span> <span class="inserted"><ins><em>their
usersâ privacy</a> due to DNS leaks. In
+ <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation</em></ins></span> of the <span
class="inserted"><ins><em>150</em></ins></span> most popular <span
class="removed"><del><strong>Android</strong></del></span>
+ <span class="inserted"><ins><em>gratis VPN</em></ins></span> apps <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a> of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect</em></ins></span> their <span
class="removed"><del><strong>users with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>usersâ
privacy</a> due</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="inserted"><ins><em>their
source code—often used for invasive advertising—that could
potentially also be used to spy on users. Other technical flaws were
@@ -1019,62 +1027,42 @@
<p>Moreover, a previous investigation had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>top 10
gratis VPN apps have lousy privacy policies</a>.</p>
+ the <span class="removed"><del><strong>500 most
popular</strong></del></span> <span class="inserted"><ins><em>top
10</em></ins></span> gratis <span class="removed"><del><strong>Android
apps</a>.</p>
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
- </li>
+ <p>The article should not</strong></del></span> <span
class="inserted"><ins><em>VPN apps</em></ins></span> have <span
class="removed"><del><strong>described</strong></del></span> <span
class="inserted"><ins><em>lousy privacy policies</a>.</p>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
+ <p>It is unfortunate that</em></ins></span> these <span
class="inserted"><ins><em>articles talk about “free
+ apps.” These</em></ins></span> apps <span
class="removed"><del><strong>as
+ “free”—they</strong></del></span> are <span
class="removed"><del><strong>not free software.</strong></del></span> <span
class="inserted"><ins><em>gratis, but they are <em>not</em> <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's
server</a>.</em></ins></span> The <span
class="removed"><del><strong>clear way</strong></del></span> <span
class="inserted"><ins><em>company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>locations</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The
company</em></ins></span> is
- <span class="removed"><del><strong>yet another
example</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding that it notify the
users</em></ins></span> of <span class="removed"><del><strong>nonfree software
pretending to obey</strong></del></span> <span class="inserted"><ins><em>what
it will do
- with</em></ins></span> the <span class="removed"><del><strong>user,
- when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
- unthinkable</strong></del></span> <span class="inserted"><ins><em>side
issue. What the company does</em></ins></span>
- with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span class="inserted"><ins><em>the
data is a secondary issue. The principal wrong here is that
+ <p>I think that lawsuit is about a side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>gratis</em></ins></span> Android apps <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ tracking people's locations.</p>
</li>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
report on the user's actions</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span> <span class="inserted"><ins><em>machine's
“advertising ID,” so that
+ <p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way
to</strong></del></span> <span class="inserted"><ins><em>app; others
only</em></ins></span> say
+ the user's activities in the app; others only</em></ins></span> say
<span class="removed"><del><strong>“zero price” is
“gratis.”</p>
<p>The article takes for granted</strong></del></span> that the <span
class="removed"><del><strong>usual analytics tools are
@@ -1305,39 +1293,37 @@
<span class="removed"><del><strong><li><p>There is also a
feature</strong></del></span>
<span class="inserted"><ins><em><li id="M201705230">
- <p>Apps</em></ins></span> for <span class="removed"><del><strong>web
sites to track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <p>Apps</em></ins></span> for <span class="removed"><del><strong>web
sites to track users, which is</strong></del></span> <span
class="inserted"><ins><em>BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it
- is still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>BART</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span>
+ is still true in iOS 7.)</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>only hope that they don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
<span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data</strong></del></span>
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound</em></ins></span> from <span
class="removed"><del><strong>iPhones for</strong></del></span> <span
class="inserted"><ins><em>beacons placed in stores or played by TV
- programs</a>.</p>
+ to ultrasound from beacons placed in stores or played</em></ins></span> by
<span class="removed"><del><strong>default, though that can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>TV
+ programs</a>.</p></em></ins></span>
</li>
- <li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging by <a
-
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>device</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704260">
+ <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal</em></ins></span> data <span
class="removed"><del><strong>from iPhones for</strong></del></span> <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>device</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
@@ -1463,9 +1449,9 @@
<a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li><p>Portable phones with GPS will send</strong></del></span>
<span class="inserted"><ins><em>infringe</em></ins></span> their <span
class="removed"><del><strong>GPS location on
- remote command</strong></del></span>
- <span class="inserted"><ins><em>privacy:</p>
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command</strong></del></span> <span
class="inserted"><ins><em>infringe their
+ privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
@@ -1595,7 +1581,7 @@
<li><p>A</strong></del></span>
<span class="inserted"><ins><em><li id="M201604250">
- <p>A</em></ins></span> pregnancy test <span
class="removed"><del><strong>controller application not only
+ <p>A</em></ins></span> pregnancy test controller <span
class="removed"><del><strong>application not only
can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
on many sorts of data in the phone, and in server accounts, it can
alter them too</a>.
@@ -1609,7 +1595,7 @@
surveillance.</p>
</li>
- <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>application not only can</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
spy on many sorts of data in the phone, and in server accounts,
@@ -1692,15 +1678,15 @@
<span class="inserted"><ins><em>Android</em></ins></span> apps <span
class="removed"><del><strong>for mobile devices report which other
apps</strong></del></span> <span class="inserted"><ins><em>contained
recognizable tracking libraries. For</em></ins></span> the <span
class="removed"><del><strong>user has
installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and
- optional</a>. Not as bad</strong></del></span> <span
class="inserted"><ins><em>paid
+ is doing this</strong></del></span> <span class="inserted"><ins><em>paid
proprietary apps, it was only 60%.</p>
- <p>The article confusingly describes gratis apps</em></ins></span>
as <span class="removed"><del><strong>what</strong></del></span>
- <span class="inserted"><ins><em>“free”, but most of them are
not in fact <a
- href="/philosophy/free-sw.html">free software</a>. It also
uses</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span>
- <span class="inserted"><ins><em>ugly word “monetize”. A good
replacement for that word
- is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ <p>The article confusingly describes gratis apps as
+ “free”, but most of them are not</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>fact <a
+ href="/philosophy/free-sw.html">free software</a>. It also uses
the
+ ugly word “monetize”. A good replacement for</em></ins></span>
that <span class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
+ is <span class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what the others
do.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
@@ -1902,118 +1888,127 @@
<li><p>Barbie
<a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>NSA takes
advantage</em></ins></span>
- to spy <span class="inserted"><ins><em>through it too</a>. Here's
information</em></ins></span> on <span class="removed"><del><strong>children
and adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>An LG “smart” watch is designed</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit
- conversations too</a>.</p>
- </li>
- <li>
- <p>A very cheap “smart watch” comes with an
Android</strong></del></span>
- <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ to spy <span class="inserted"><ins><em>through it too</a>. Here's
information</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</em></ins></span> app
- <span class="removed"><del><strong><a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
- <p>The article says this</strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p>
+ More about NSA app spying</a>.</p>
</li>
<li id="M200510200">
- <p>Blizzard Warden</em></ins></span> is a <span
class="removed"><del><strong>back door, but</strong></del></span> <span
class="inserted"><ins><em>hidden
- “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>could be</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Blizzard Warden is a hidden
+ “cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on</em></ins></span> a
- <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
- least.</p></strong></del></span> <span
class="inserted"><ins><em>gamer's computer and sniffs a
+ spies on every process running on a gamer's computer</em></ins></span> and
<span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+
+<span class="removed"><del><strong><!-- #SpywareOnSmartWatches -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <h3 <span
class="removed"><del><strong>id="SpywareOnSmartWatches">Spyware on
“Smart” Watches</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span <span class="removed"><del><strong>class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>An LG “smart” watch is designed</strong></del></span>
+
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>report its
location</strong></del></span> <span class="inserted"><ins><em>snoop on the
people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
<p>It is unfortunate that the article uses the term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a></strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>television?”
I said, “I
-don't know. You can't see out the other way.”
Evidently</em></ins></span> that <span class="inserted"><ins><em>was
+<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>someone
else</strong></del></span> <span class="inserted"><ins><em>me</em></ins></span>
and <span class="removed"><del><strong>to transmit
+ conversations too</a>.</p>
+ </li>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>TV sees,â in the own words of the company's
- CTO, and this data is sold to third parties. This</em></ins></span> is
<span class="removed"><del><strong>not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> in <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>return for
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
+ CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>an unidentified site</strong></del></span> <span
class="inserted"><ins><em>third parties. This is</em></ins></span> in <span
class="removed"><del><strong>China</a>.</p>
+ <p>The article says</strong></del></span> <span
class="inserted"><ins><em>return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
+ <p>What is supposed to make</em></ins></span> this <span
class="inserted"><ins><em>spying acceptable, according to him,</em></ins></span>
+ is <span class="removed"><del><strong>a back door,
but</strong></del></span> that <span class="removed"><del><strong>could be a
+ misunderstanding. However,</strong></del></span> it is <span
class="removed"><del><strong>certainly surveillance, at
+ least.</p>
+ </li>
+</ul>
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>If you already</em></ins></span> own <span
class="removed"><del><strong>malware</a>.
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>opt-in</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>newer models. But since the Vizio software is
+ nonfree, we don't know what is actually happening behind the
scenes,</em></ins></span>
+ and <span class="removed"><del><strong>spyware via BIOS</a> on
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>there is no
guarantee</em></ins></span> that <span class="inserted"><ins><em>all future
updates will leave</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
+
+ <p>If you already own</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>Vizio smart TV
(or any smart TV, for that
+ matter), the easiest way to make sure it isn't spying on you is
+ to disconnect it from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this</em></ins></span> is not <span
class="removed"><del><strong>really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its</strong></del></span> <span class="inserted"><ins><em>always
possible. Another option,
+ if you are technically oriented, is to get your</em></ins></span> own
<span class="removed"><del><strong>malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS:</strong></del></span> <span class="inserted"><ins><em>a
Vizio smart TV (or any smart TV, for that
- matter), the easiest way to</em></ins></span> make sure <span
class="removed"><del><strong>to place new items</strong></del></span> <span
class="inserted"><ins><em>it isn't spying</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>router (which can
+ be an old computer running completely free software), and set up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2023,25 +2018,20 @@
<ul>
<li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>you is
- to disconnect</em></ins></span> it <span class="inserted"><ins><em>from
the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router
(which</em></ins></span> can <span
class="removed"><del><strong>collect</strong></del></span>
- <span class="inserted"><ins><em>be an old computer running completely free
software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
+ Shows</strong></del></span> <span class="inserted"><ins><em>block
connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
<li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link to the article for the facts</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>presents. It
is too bad that the article finishes by advocating</em></ins></span> the
<span class="removed"><del><strong>emails of members</strong></del></span>
<span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>Parliament
this way, because they pass it through Microsoft.</p></li>
@@ -3195,7 +3185,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:44 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary-surveillance.de.po 22 Feb 2019 11:31:44 -0000 1.261
+++ proprietary-surveillance.de.po 22 Feb 2019 14:30:59 -0000 1.262
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -3147,11 +3147,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.378
retrieving revision 1.379
diff -u -b -r1.378 -r1.379
--- proprietary-surveillance.fr.po 22 Feb 2019 11:31:44 -0000 1.378
+++ proprietary-surveillance.fr.po 22 Feb 2019 14:30:59 -0000 1.379
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2019-02-21 12:12+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -2588,11 +2588,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary-surveillance.it-diff.html 22 Feb 2019 11:31:44 -0000
1.112
+++ proprietary-surveillance.it-diff.html 22 Feb 2019 14:30:59 -0000
1.113
@@ -1907,9 +1907,9 @@
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever the TV sees,â in the own words of the company's
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
@@ -2999,7 +2999,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:44 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.274
retrieving revision 1.275
diff -u -b -r1.274 -r1.275
--- proprietary-surveillance.it.po 22 Feb 2019 11:31:44 -0000 1.274
+++ proprietary-surveillance.it.po 22 Feb 2019 14:30:59 -0000 1.275
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -2950,11 +2950,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary-surveillance.ja-diff.html 22 Feb 2019 11:31:44 -0000
1.122
+++ proprietary-surveillance.ja-diff.html 22 Feb 2019 14:30:59 -0000
1.123
@@ -1751,9 +1751,9 @@
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever the TV sees,â in the own words of the company's
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
@@ -2816,7 +2816,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:44 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- proprietary-surveillance.ja.po 22 Feb 2019 11:31:44 -0000 1.247
+++ proprietary-surveillance.ja.po 22 Feb 2019 14:30:59 -0000 1.248
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -2451,11 +2451,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- proprietary-surveillance.pot 22 Feb 2019 11:31:44 -0000 1.195
+++ proprietary-surveillance.pot 22 Feb 2019 14:30:59 -0000 1.196
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1785,12 +1785,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs "
-"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
"
-"collect âwhatever the TV sees,â in the own words of the company's CTO,
and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
+"Vizio TVs <a "
+"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\">
"
+"collect “whatever the TV sees,”</a> in the own words of the "
+"company's CTO, and this data is sold to third parties. This is in return for "
+"“better service” (meaning more intrusive ads?) and slightly "
+"lower retail prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.471
retrieving revision 1.472
diff -u -b -r1.471 -r1.472
--- proprietary-surveillance.ru.po 22 Feb 2019 11:31:44 -0000 1.471
+++ proprietary-surveillance.ru.po 22 Feb 2019 14:30:59 -0000 1.472
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -2563,11 +2563,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary.de-diff.html 22 Feb 2019 11:31:44 -0000 1.49
+++ proprietary.de-diff.html 22 Feb 2019 14:30:59 -0000 1.50
@@ -186,9 +186,9 @@
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever the TV sees,â in the own words of the company's
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
@@ -317,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:44 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.de.po 22 Feb 2019 11:31:46 -0000 1.91
+++ proprietary.de.po 22 Feb 2019 14:30:59 -0000 1.92
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,11 +431,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary.es.po 22 Feb 2019 11:31:46 -0000 1.103
+++ proprietary.es.po 22 Feb 2019 14:30:59 -0000 1.104
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2019-02-21 13:07+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -299,11 +299,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary.fr.po 22 Feb 2019 11:31:46 -0000 1.126
+++ proprietary.fr.po 22 Feb 2019 14:30:59 -0000 1.127
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2019-02-21 12:12+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -295,11 +295,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.it-diff.html 22 Feb 2019 11:31:46 -0000 1.61
+++ proprietary.it-diff.html 22 Feb 2019 14:30:59 -0000 1.62
@@ -101,18 +101,18 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,9 +185,9 @@
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever the TV sees,â in the own words of the company's
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:46 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.it.po 22 Feb 2019 11:31:46 -0000 1.100
+++ proprietary.it.po 22 Feb 2019 14:30:59 -0000 1.101
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,11 +435,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary.ja-diff.html 22 Feb 2019 11:31:46 -0000 1.62
+++ proprietary.ja-diff.html 22 Feb 2019 14:30:59 -0000 1.63
@@ -97,17 +97,17 @@
</tr>
<tr>
<td>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <ul>
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
- <li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
- <li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
<li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -182,9 +182,9 @@
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever the TV sees,â in the own words of the company's
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
@@ -313,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:46 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary.ja.po 22 Feb 2019 11:31:46 -0000 1.83
+++ proprietary.ja.po 22 Feb 2019 14:30:59 -0000 1.84
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,11 +355,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.nl-diff.html 22 Feb 2019 11:31:46 -0000 1.61
+++ proprietary.nl-diff.html 22 Feb 2019 14:30:59 -0000 1.62
@@ -185,9 +185,9 @@
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever the TV sees,â in the own words of the company's
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
@@ -316,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:46 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.nl.po 22 Feb 2019 11:31:46 -0000 1.72
+++ proprietary.nl.po 22 Feb 2019 14:30:59 -0000 1.73
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,11 +428,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary.pl-diff.html 22 Feb 2019 11:31:46 -0000 1.79
+++ proprietary.pl-diff.html 22 Feb 2019 14:30:59 -0000 1.80
@@ -183,9 +183,9 @@
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever the TV sees,â in the own words of the company's
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
@@ -314,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:46 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.pl.po 22 Feb 2019 11:31:47 -0000 1.67
+++ proprietary.pl.po 22 Feb 2019 14:30:59 -0000 1.68
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,11 +510,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.pot 22 Feb 2019 11:31:47 -0000 1.64
+++ proprietary.pot 22 Feb 2019 14:30:59 -0000 1.65
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,12 +245,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs "
-"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
"
-"collect âwhatever the TV sees,â in the own words of the company's CTO,
and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
+"Vizio TVs <a "
+"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\">
"
+"collect “whatever the TV sees,”</a> in the own words of the "
+"company's CTO, and this data is sold to third parties. This is in return for "
+"“better service” (meaning more intrusive ads?) and slightly "
+"lower retail prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.pt-br.po 22 Feb 2019 11:31:47 -0000 1.91
+++ proprietary.pt-br.po 22 Feb 2019 14:30:59 -0000 1.92
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2019-02-21 21:29-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,11 +293,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary.ru.po 22 Feb 2019 11:31:47 -0000 1.156
+++ proprietary.ru.po 22 Feb 2019 14:30:59 -0000 1.157
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -299,11 +299,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary.zh-tw-diff.html 22 Feb 2019 11:31:47 -0000 1.39
+++ proprietary.zh-tw-diff.html 22 Feb 2019 14:30:59 -0000 1.40
@@ -186,9 +186,9 @@
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs
-
https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019
- collect âwhatever the TV sees,â in the own words of the company's
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of
the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
@@ -317,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 11:31:47 $
+$Date: 2019/02/22 14:30:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary.zh-tw.po 22 Feb 2019 11:31:47 -0000 1.50
+++ proprietary.zh-tw.po 22 Feb 2019 14:30:59 -0000 1.51
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-22 11:26+0000\n"
+"POT-Creation-Date: 2019-02-22 14:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,11 +344,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- pt-br.po 22 Feb 2019 11:31:47 -0000 1.45
+++ pt-br.po 22 Feb 2019 14:30:59 -0000 1.46
@@ -1263,11 +1263,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- ru.po 22 Feb 2019 11:31:47 -0000 1.73
+++ ru.po 22 Feb 2019 14:30:59 -0000 1.74
@@ -1687,11 +1687,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- zh-tw.po 22 Feb 2019 11:31:47 -0000 1.32
+++ zh-tw.po 22 Feb 2019 14:30:59 -0000 1.33
@@ -1255,11 +1255,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Vizio TVs https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-"
-"tv-bill-baxter-interview-vergecast-ces-2019 collect âwhatever the TV
sees,â "
-"in the own words of the company's CTO, and this data is sold to third "
-"parties. This is in return for “better service” (meaning more "
-"intrusive ads?) and slightly lower retail prices."
+"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
+"whatever the TV sees,”</a> in the own words of the company's CTO, and "
+"this data is sold to third parties. This is in return for “better "
+"service” (meaning more intrusive ads?) and slightly lower retail "
+"prices."
msgstr ""
#. type: Content of: <ul><li><p>
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/24
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28