[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 28 Feb 2019 04:00:42 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/28 04:00:40
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po nl.po pl.po pot
proprietary-drm.de-diff.html
proprietary-drm.de.po proprietary-drm.fr.po
proprietary-drm.it-diff.html
proprietary-drm.it.po
proprietary-drm.ja-diff.html
proprietary-drm.ja.po proprietary-drm.pot
proprietary-drm.ru.po
proprietary-subscriptions.de-diff.html
proprietary-subscriptions.de.po
proprietary-subscriptions.fr.po
proprietary-subscriptions.ja-diff.html
proprietary-subscriptions.ja.po
proprietary-subscriptions.pot
proprietary-subscriptions.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.382&r2=1.383
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.249&r2=1.250
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.477&r2=1.478
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.36&r2=1.37
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- de.po 25 Feb 2019 10:31:06 -0000 1.36
+++ de.po 28 Feb 2019 09:00:38 -0000 1.37
@@ -2123,6 +2123,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- es.po 25 Feb 2019 10:31:06 -0000 1.46
+++ es.po 28 Feb 2019 09:00:38 -0000 1.47
@@ -1675,6 +1675,21 @@
msgstr ""
#. type: Content of: <ul><li><p>
+msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- fr.po 25 Feb 2019 12:05:44 -0000 1.64
+++ fr.po 28 Feb 2019 09:00:38 -0000 1.65
@@ -1675,6 +1675,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- it.po 25 Feb 2019 10:31:06 -0000 1.36
+++ it.po 28 Feb 2019 09:00:38 -0000 1.37
@@ -2067,6 +2067,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- ja.po 25 Feb 2019 10:31:06 -0000 1.36
+++ ja.po 28 Feb 2019 09:00:38 -0000 1.37
@@ -1745,6 +1745,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-appliances.de-diff.html 25 Feb 2019 10:31:07 -0000 1.35
+++ malware-appliances.de-diff.html 28 Feb 2019 09:00:38 -0000 1.36
@@ -78,13 +78,26 @@
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
- <li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span> <a
+ <li id="M201902080">
+ <p>The HP</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer, based on
the fact
- that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ Canary camera</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the
user</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies</em></ins></span> on <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions in</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>use of a printer</em></ins></span> that <span
class="inserted"><ins><em>would otherwise be in
+ working order.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send</em></ins></span> the <span class="removed"><del><strong>device is
tethered</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="removed"><del><strong>a
server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
<p>But</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a>, which save</em></ins></span> it <span
class="removed"><del><strong>also demonstrates that</strong></del></span>
@@ -111,399 +124,428 @@
</li>
<span class="removed"><del><strong><li>
- <p>The bad security</strong></del></span>
+ <p>The bad security in many Internet of Stings devices
+ allows</strong></del></span>
<span class="inserted"><ins><em><li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a></em></ins></span> in
<span class="removed"><del><strong>many Internet</strong></del></span> <span
class="inserted"><ins><em>the own words</em></ins></span> of <span
class="removed"><del><strong>Stings devices
- allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on</strong></del></span> the <span
class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>company's
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>people that use them</a>.</p>
+ <p>Don't be a sucker—reject all</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in</em></ins></span> the
<span class="removed"><del><strong>stings.</p>
+ <p>It</strong></del></span> <span class="inserted"><ins><em>own words
of the company's
CTO, and this data is sold to third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
- is</em></ins></span> that <span class="removed"><del><strong>use
them</a>.</p>
- <p>Don't be a sucker—reject all</strong></del></span> <span
class="inserted"><ins><em>it is opt-in in newer models. But
since</em></ins></span> the <span class="removed"><del><strong>stings.</p>
- <p>It</strong></del></span> <span class="inserted"><ins><em>Vizio
software</em></ins></span> is <span
class="removed"><del><strong>unfortunate</strong></del></span>
- <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind the scenes,
- and there is no guarantee</em></ins></span> that <span
class="inserted"><ins><em>all future updates will leave</em></ins></span> the
<span class="removed"><del><strong>article uses</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter),</em></ins></span> the
- <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>What is supposed to make this spying acceptable, according to
him,</em></ins></span>
+ is <span class="removed"><del><strong>unfortunate</strong></del></span>
that <span class="inserted"><ins><em>it is opt-in in newer models. But
since</em></ins></span> the <span class="removed"><del><strong>article uses the
+ term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+</li>
+
+<li>
+ <p>Many models of Internet-connected cameras are tremendously insecure.
+ They have login accounts with hard-coded passwords, which can't be
+ changed,</strong></del></span> <span class="inserted"><ins><em>Vizio
software is
+ nonfree, we don't know what is actually happening behind the
scenes,</em></ins></span>
+ and <span class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</strong></del></span>
<span class="inserted"><ins><em>there</em></ins></span> is no <span
class="removed"><del><strong>way to
+ delete these accounts either</a>.</p>
</li>
<li>
- <p>Many models of Internet-connected cameras</strong></del></span>
<span class="inserted"><ins><em>easiest way to make sure it isn't spying on you
is
- to disconnect it from the Internet, and use a terrestrial antenna
+<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>guarantee</em></ins></span> that <span
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p>
+</li>
+
+<li><p>Users are suing Bose for <a
+href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing</strong></del></span> <span class="inserted"><ins><em>all future
updates will leave the
+ settings unchanged.</p>
+
+ <p>If you already own</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>Vizio smart TV (or any smart TV,</em></ins></span>
for <span class="removed"><del><strong>its headphones</a>.
+Specifically, the app would record the names of the audio files
+users listen to along with the headphone's unique serial number.
+</p>
+
+<p>The suit accuses</strong></del></span> that <span
class="removed"><del><strong>this was done without the users' consent.
+If the fine print of</strong></del></span>
+ <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
+would that</strong></del></span> <span class="inserted"><ins><em>easiest way
to</em></ins></span> make <span
class="inserted"><ins><em>sure</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>isn't spying on
you is</em></ins></span>
+ to <span class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you</em></ins></span> are <span
class="removed"><del><strong>tremendously insecure.
- They have login accounts with hard-coded passwords, which
can't</strong></del></span> <span class="inserted"><ins><em>technically
oriented, is to get your own router (which can</em></ins></span>
- be
- <span class="removed"><del><strong>changed,</strong></del></span> <span
class="inserted"><ins><em>an old computer running completely free
software),</em></ins></span> and <span class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span> <span class="inserted"><ins><em>set up a
- firewall</em></ins></span> to
- <span class="removed"><del><strong>delete these accounts
either</a>.</p></strong></del></span> <span
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last
resort,
- you can replace your TV with another model.</p></em></ins></span>
- </li>
+ if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+</p>
+</li>
-<span class="removed"><del><strong><li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is</strong></del></span>
+<li id="anova">
+ <p>Anova sabotaged users' cooking devices with</strong></del></span>
<span class="inserted"><ins><em>get your own router (which can
+ be an old computer running completely free software), and set
up</em></ins></span> a <span class="removed"><del><strong>downgrade that
+ tethered them</strong></del></span>
+ <span class="inserted"><ins><em>firewall to block
connections</em></ins></span> to <span class="inserted"><ins><em>Vizio's
servers. Or, as</em></ins></span> a <span class="removed"><del><strong>remote
server.</strong></del></span> <span class="inserted"><ins><em>last resort,
+ you can replace your TV with another model.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
-full</strong></del></span>
+ <li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>gross</strong></del></span> <span
class="inserted"><ins><em>everything they
+ give the manufacturer</em></ins></span> an <span
class="removed"><del><strong>account on Anova's servers, their
+ cookers won't function.</a></p>
+</li>
+
+<li>
+<p>When Miele's Internet</strong></del></span> <span
class="inserted"><ins><em>unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
+<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
<span class="inserted"><ins><em>everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's
not</em></ins></span>
- security <span
class="removed"><del><strong>faults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>for your home. Security means making sure they
don't get to
- see through your camera.</p></em></ins></span>
- </li>
-
-<span
class="removed"><del><strong><li><p>Users</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810150">
- <p>Printer manufacturers</em></ins></span> are <span
class="removed"><del><strong>suing Bose for</strong></del></span> <span
class="inserted"><ins><em>very innovative—at blocking the
- use of independent replacement ink cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing a spyware app for its headphones</a>.
-Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p>
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>Internet,
+its</strong></del></span> <span class="inserted"><ins><em>videos. That's
not</em></ins></span>
+ security <span class="removed"><del><strong>is crap</a>.</p>
+<p>For example, a cracker can gain access</strong></del></span> <span
class="inserted"><ins><em>for your home. Security means making sure they don't
get</em></ins></span> to
+ <span class="inserted"><ins><em>see through your camera.</p>
+ </li>
+
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at
blocking</em></ins></span> the <span class="removed"><del><strong>dishwasher's
filesystem,
+ infect it with malware,</strong></del></span>
+ <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP</em></ins></span> and <span
class="removed"><del><strong>force</strong></del></span> <span
class="inserted"><ins><em>Epson have done this</a>.</p>
</li>
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
- only through</em></ins></span> the <span class="removed"><del><strong>app
would record</strong></del></span> <span class="inserted"><ins><em>company's
server. They have
- all</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>nasty characteristics</em></ins></span> of <span
class="removed"><del><strong>the audio files</strong></del></span> <span
class="inserted"><ins><em>such devices: <a
+ only through</em></ins></span> the <span
class="removed"><del><strong>dishwasher to launch attacks on
+ other devices in</strong></del></span> <span
class="inserted"><ins><em>company's server. They have
+ all</em></ins></span> the <span class="removed"><del><strong>network.
Since these dishwashers are used in hospitals,</strong></del></span> <span
class="inserted"><ins><em>nasty characteristics of</em></ins></span> such <span
class="removed"><del><strong>attacks could potentially put
hundreds</strong></del></span> <span class="inserted"><ins><em>devices: <a
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all</em></ins></span> users <span class="removed"><del><strong>listen to
along with</strong></del></span> <span class="inserted"><ins><em>at once), as
well as</em></ins></span> the <span class="removed"><del><strong>headphone's
unique serial number.
-</p>
+ surveillance, and danger</em></ins></span> of <span
class="removed"><del><strong>lives</strong></del></span> <span
class="inserted"><ins><em>sabotage</a> (of a specific user, or of
+ all users</em></ins></span> at <span
class="removed"><del><strong>risk.</p>
-<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>risk of an outage (which is what
+</li>
+<li>
+<p>If</strong></del></span> <span class="inserted"><ins><em>once), as
well as the risk of an outage (which is what
just happened).</p>
<p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p>
+ nonfree software. With an old-fashioned thermostat,</em></ins></span> you
<span class="removed"><del><strong>buy a used “smart” car, house,
TV, refrigerator,
+etc.,
+usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+previous owners</strong></del></span> can <span
class="removed"><del><strong>still remotely control
it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>do it
+ using controls right on the thermostat.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p>Vizio
+ “smart”</strong></del></span>
- <li id="M201809240">
- <p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so</em></ins></span> that
<span class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>people cannot hear
- them, but Alexa and Siri can.</p>
+ <span class="inserted"><ins><em><li id="M201809240">
+ <p>Researchers have discovered how to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so</em></ins></span> that
<span class="removed"><del><strong>is viewed on</strong></del></span> <span
class="inserted"><ins><em>people cannot hear</em></ins></span>
+ them, <span class="inserted"><ins><em>but Alexa</em></ins></span> and
<span class="removed"><del><strong>not just broadcasts</strong></del></span>
<span class="inserted"><ins><em>Siri can.</p>
</li>
<li id="M201807050">
- <p>The Jawbone fitness tracker</em></ins></span> was <span
class="removed"><del><strong>done without</strong></del></span> <span
class="inserted"><ins><em>tethered to a proprietary phone
- app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>company shut down and
made</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span class="inserted"><ins><em>app stop working.
<a
-
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
- the existing trackers stopped working forever</a>.</p>
-
- <p>The article focuses on a further nasty fillip, that
sales</em></ins></span> of the <span class="removed"><del><strong>app
said</strong></del></span>
- <span class="inserted"><ins><em>broken devices continued. But I
think</em></ins></span> that <span class="removed"><del><strong>users gave
consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>is a
secondary issue;</em></ins></span>
- it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span> <span class="inserted"><ins><em>made the nasty
consequences extend to some additional people.
- The fundamental wrong was</em></ins></span> to design the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>devices</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>depend on
something
- else that didn't respect users' freedom.</p></em></ins></span>
+ <p>The Jawbone fitness tracker was tethered to a proprietary phone
+ app. In 2017, the company shut down</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>app stop working. <a
+
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All</em></ins></span>
+ the <span class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>existing
trackers stopped working forever</a>.</p>
+
+ <p>The article focuses on a further nasty fillip, that sales
of</em></ins></span> the <span class="removed"><del><strong>TV reports
what</strong></del></span>
+ <span class="inserted"><ins><em>broken devices continued. But I think that
is a secondary issue;</em></ins></span>
+ it <span class="removed"><del><strong>is.</strong></del></span> <span
class="inserted"><ins><em>made the nasty consequences extend to some additional
people.</em></ins></span>
+ The <span class="removed"><del><strong>existence of a
way</strong></del></span> <span class="inserted"><ins><em>fundamental wrong
was</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>devices to depend on something
+ else that didn't respect users' freedom.</p>
</li>
- <li <span class="removed"><del><strong>id="anova">
- <p>Anova sabotaged users' cooking devices with</strong></del></span>
<span class="inserted"><ins><em>id="M201804140">
+ <li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers</em></ins></span> a <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush</em></ins></span> that
- <span class="removed"><del><strong>tethered them to a remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account</strong></del></span> <span
class="inserted"><ins><em>snoops</em></ins></span> on <span
class="removed"><del><strong>Anova's servers, their
- cookers won't function.</a></p></strong></del></span> <span
class="inserted"><ins><em>its user by
- sending usage data back over the
Internet</a>.</p></em></ins></span>
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
</li>
-
<span class="removed"><del><strong><li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher
is</strong></del></span>
+<p>More or less all “smart”</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to the Internet,
-its security is crap</a>.</p>
-<p>For example,</strong></del></span>
+ <p>Some “Smart”</em></ins></span> TVs <span
class="inserted"><ins><em>automatically</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+<p>The report was as of 2014, but we don't expect this has got
+better.</p>
+
+<p>This shows</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>cracker can gain access</strong></del></span>
<span class="inserted"><ins><em>surveillance app</a>.</p>
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+consent before collecting personal data are totally inadequate. And
+what happens if</strong></del></span> <span
class="inserted"><ins><em>install</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV will say,
+“Without your consent</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
+
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will not
+work.”</p>
+
+<p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>article for the facts it presents. It
+ is too bad</em></ins></span> that <span class="removed"><del><strong>TVs
are not allowed to report what</strong></del></span> the
+<span class="removed"><del><strong>user watches — no
exceptions!</p>
+</li>
+<li>
+<p>Some LG
+TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+tyrants</a>.</p>
+</li>
- <p>We link</em></ins></span> to the <span
class="removed"><del><strong>dishwasher's filesystem,
- infect</strong></del></span> <span class="inserted"><ins><em>article for the
facts</em></ins></span> it <span class="removed"><del><strong>with malware, and
force</strong></del></span> <span class="inserted"><ins><em>presents. It
- is too bad that</em></ins></span> the <span
class="removed"><del><strong>dishwasher</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating the
- moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
- other</strong></del></span> <span class="inserted"><ins><em>Netflix. The
Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
+<li><a
+href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
+Samsung “Smart” TVs have turned Linux into</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the <span class="removed"><del><strong>base
+for a tyrant system</a> so as to impose DRM.
+What enables Samsung</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness of
surrendering</em></ins></span> to <span class="removed"><del><strong>do this is
that Linux is released under
+GNU GPL version 2,</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> <a
<span class="removed"><del><strong>href="/licenses/rms-why-gplv3.html">not
version 3</a>,
+together with a weak interpretation of GPL version 2.</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p></em></ins></span>
</li>
- <li id="M201802120">
- <p>Apple</em></ins></span> devices <span
class="inserted"><ins><em>lock users</em></ins></span> in <span
class="inserted"><ins><em><a
-
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely to Apple services</a> by being designed to be incompatible
+<span class="removed"><del><strong><li>
+<p>A company that makes internet-controlled
vibrators</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201802120">
+ <p>Apple devices lock users in</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by</em></ins></span> being <span
class="removed"><del><strong>sued for collecting lots of personal information
about how
+people use it</a>.</p>
+
+<p>The company's statement that it anonymizes the data may be true,
+but it doesn't really matter. If it sells the data</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>a data broker,</strong></del></span> <span
class="inserted"><ins><em>be incompatible
with all other options, ethical or unethical.</p>
</li>
<li id="M201712240">
- <p>One of</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
- such attacks could potentially put hundreds</strong></del></span> <span
class="inserted"><ins><em>dangers</em></ins></span> of <span
class="removed"><del><strong>lives at risk.</p>
-
+ <p>One of</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>dangers
of</em></ins></span> the <span class="removed"><del><strong>user is.</p>
</li>
+
<li>
-<p>If</strong></del></span> <span class="inserted"><ins><em>the
“internet of stings”
- is that, if</em></ins></span> you <span class="removed"><del><strong>buy a
used “smart” car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span> <span class="inserted"><ins><em>lose your
internet service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely</strong></del></span>
+<p>Google/Alphabet</strong></del></span> <span
class="inserted"><ins><em>“internet of stings”
+ is that, if you lose your internet service, you also</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+intentionally broke Revolv home automatic</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose</em></ins></span> control <span
class="removed"><del><strong>it</a>.</p>
-</li>
-<li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence</strong></del></span>
of <span class="inserted"><ins><em>your house and
appliances</a>.</p>
-
- <p>For your safety, don't use any appliance with</em></ins></span> a
<span class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>connection</em></ins></span> to
- <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as it was in
- these TVs, does not legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
- <span class="inserted"><ins><em>real internet.</p></em></ins></span>
+ lose</em></ins></span> control <span class="removed"><del><strong>products
that depended on</strong></del></span> <span class="inserted"><ins><em>of your
house and appliances</a>.</p>
+
+ <p>For your safety, don't use any appliance with</em></ins></span> a
<span class="removed"><del><strong>server</a></strong></del></span> <span
class="inserted"><ins><em>connection</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't stand for that!
Insist
+on self-contained computers that run free
software!</p></strong></del></span> <span class="inserted"><ins><em>the
+ real internet.</p></em></ins></span>
</li>
+
<span class="removed"><del><strong><li>
-<p>More or less all “smart” TVs</strong></del></span>
+<p>ARRIS cable modem</strong></del></span>
<span class="inserted"><ins><em><li id="M201711200">
- <p>Amazon recently invited consumers to be suckers
and</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff to open</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p>
-
-<p>The report was as of 2014, but we don't expect
this</strong></del></span> <span class="inserted"><ins><em>front
doors</a>. Wouldn't you know
- it, the system</em></ins></span> has <span class="removed"><del><strong>got
-better.</p>
-
-<p>This shows that laws requiring products to get users' formal
-consent before collecting personal data are totally inadequate. And
-what happens if</strong></del></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV will say,
-“Without your consent to tracking, the TV will not
-work.”</p>
-
-<p>Proper laws would say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>grave security flaw.</p>
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system</em></ins></span> has a <span
class="inserted"><ins><em>grave security flaw.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the
-<span class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ <p>A remote-control sex toy was found to make</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+backdoor in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
+</li>
+
+<li>
+<p>HP “storage appliances” that use the proprietary
+“Left Hand” operating system have back doors that give
HP</strong></del></span> <span class="inserted"><ins><em>conversation between
two users</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Some LG
-TVs</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711080">
+ <li id="M201711080">
<p>Logitech will sabotage
- all Harmony Link household control devices by</em></ins></span> <a
<span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
-tyrants</a>.</p>
-</li>
-
-<li><a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-Samsung “Smart” TVs have turned Linux into</strong></del></span>
+ all Harmony Link household control devices by</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a> to them. HP claims that this does not give HP
+access to</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the <span class="removed"><del><strong>base
-for a tyrant system</a> so as to impose DRM.
-What enables Samsung to do</strong></del></span> <span
class="inserted"><ins><em>server through which the products' supposed owners
+ turning off</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>server through which</em></ins></span> the
<span class="removed"><del><strong>back door allows
+installation of software changes,</strong></del></span> <span
class="inserted"><ins><em>products' supposed owners
communicate with them</a>.</p>
- <p>The owners suspect</em></ins></span> this is <span
class="inserted"><ins><em>to pressure them to buy a newer model. If
- they are wise, they will learn, rather, to distrust any
product</em></ins></span> that <span class="removed"><del><strong>Linux is
released under
-GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version
3</a>,
-together</strong></del></span>
- <span class="inserted"><ins><em>requires users to talk</em></ins></span>
with <span class="removed"><del><strong>a weak interpretation of GPL version
2.</strong></del></span> <span class="inserted"><ins><em>them through some
specialized service.</p></em></ins></span>
+ <p>The owners suspect this is to pressure them to
buy</em></ins></span> a <span class="removed"><del><strong>change could be
installed</strong></del></span> <span class="inserted"><ins><em>newer model. If
+ they are wise, they will learn, rather, to distrust any
product</em></ins></span> that
+<span class="removed"><del><strong>would give access</strong></del></span>
+ <span class="inserted"><ins><em>requires users</em></ins></span> to <span
class="removed"><del><strong>the customer's data.
+</p>
+</li>
+
+<li>
+<p><a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+Some D-Link routers</a> have a back door for changing settings in a
+dlink of an eye.</p>
+
+<p>
+<a href="https://github.com/elvanderb/TCP-32764">Many models of routers
+have back doors</a>.</p></strong></del></span> <span
class="inserted"><ins><em>talk with them through some specialized
service.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>A company that makes internet-controlled
vibrators</strong></del></span>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router has</strong></del></span>
<span class="inserted"><ins><em><li id="M201710040">
<p>Every “home security” camera, if its
- manufacturer can communicate with it, is a surveillance
device.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
-being sued for collecting lots of personal information about how
-people use it</a>.</p></strong></del></span>
+ manufacturer can communicate with it, is</em></ins></span> a <span
class="removed"><del><strong>backdoor</a>.</p>
+</li>
+
+<li>
+<p>The</strong></del></span> <span
class="inserted"><ins><em>surveillance device.</em></ins></span> <a <span
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer was designed with DRM</a>: it won't accept
+third-party printing materials. It</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p></em></ins></span>
+ Canary camera</em></ins></span> is <span class="inserted"><ins><em>an
example</a>.</p>
+
+ <p>The article describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>Keurig of printers. Now it is
+being discontinued, which means that eventually authorized materials won't
+be available and</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+ the <span class="removed"><del><strong>printers may become
unusable.</p>
+
+<p>With a <a
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer</strong></del></span> <span
class="inserted"><ins><em>fact</em></ins></span> that <span
class="removed"><del><strong>gets</strong></del></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
+even be</strong></del></span> <span class="inserted"><ins><em>device is
tethered to</em></ins></span> a <span class="removed"><del><strong>remote
possibility.</p>
- <p>The <span class="removed"><del><strong>company's statement that
it anonymizes</strong></del></span> <span class="inserted"><ins><em>article
describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>data may be true,
-but it doesn't really matter. If it sells</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
- the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>fact that the device is tethered</em></ins></span> to
a <span class="removed"><del><strong>data broker,
-the data broker can figure out who</strong></del></span> <span
class="inserted"><ins><em>server.</p>
+<p>How pitiful that the author of that article
says</strong></del></span> <span class="inserted"><ins><em>server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that</em></ins></span> the <span
class="removed"><del><strong>user is.</p></strong></del></span> <span
class="inserted"><ins><em>device gives the company
- surveillance capability.</p></em></ins></span>
+ <p>But it also demonstrates</em></ins></span> that <span
class="removed"><del><strong>there was
+“nothing wrong” with designing</strong></del></span> the device
<span class="removed"><del><strong>to restrict users in</strong></del></span>
<span class="inserted"><ins><em>gives</em></ins></span> the <span
class="removed"><del><strong>first place. This is like putting a “cheat
me and mistreat me”
+sign on your chest. We should know better: we should condemn all companies
+that take advantage of people like him. Indeed, it</strong></del></span>
<span class="inserted"><ins><em>company
+ surveillance capability.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google/Alphabet</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709200">
+ <li id="M201709200">
<p>A “smart” intravenous pump
- designed for hospitals is connected to the internet.
Naturally</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
-intentionally broke Revolv home automatic control
products</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ designed for hospitals</em></ins></span> is <span
class="inserted"><ins><em>connected to</em></ins></span> the <span
class="removed"><del><strong>acceptance of
+their unjust practice</strong></del></span> <span
class="inserted"><ins><em>internet. Naturally <a
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note</em></ins></span> that <span
class="removed"><del><strong>depended on
-a server</a></strong></del></span> <span class="inserted"><ins><em>this
article misuses the term <a
+ <p>Note</em></ins></span> that <span
class="removed"><del><strong>teaches people</strong></del></span> <span
class="inserted"><ins><em>this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't stand for that!
Insist
-on self-contained computers that run free
software!</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
+ referring</em></ins></span> to <span class="removed"><del><strong>be
doormats.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>ARRIS cable modem has a <a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor</strong></del></span>
+<p>Philips “smart” lightbulbs</strong></del></span>
<span class="inserted"><ins><em><li id="M201708280">
- <p>The bad security</em></ins></span> in <span
class="inserted"><ins><em>many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+have been designed not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>interact with other companies' smart
+lightbulbs</a>.</p>
+
+<p>If</strong></del></span> <span class="inserted"><ins><em>snoop on the
people that use them</a>.</p>
+
+ <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>product is “smart”, and you didn't
build it, it</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all the stings.</p>
+
+ <p>It</em></ins></span> is
+<span class="removed"><del><strong>cleverly serving its manufacturer
<em>against you</em>.</p>
</li>
<li>
-<p>HP “storage appliances”</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> that use <span
class="inserted"><ins><em>them</a>.</p>
-
- <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>proprietary
-“Left Hand” operating system have back doors</strong></del></span>
<span class="inserted"><ins><em>stings.</p>
+<p><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+DVDs and Bluray disks have DRM</a>.
+</p>
- <p>It is unfortunate</em></ins></span> that <span
class="removed"><del><strong>give HP</strong></del></span> <span
class="inserted"><ins><em>the article uses the term</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-remote login access</a> to them. HP claims that this does not give HP
-access</strong></del></span>
+<p>That page uses spin terms</strong></del></span> <span
class="inserted"><ins><em>unfortunate</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>the article
uses the term</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+digital “rights” management</a>
+and</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li id="M201708230">
- <p>Sonos <a
-
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
- told all its customers, “Agree”</em></ins></span>
- to <span class="inserted"><ins><em>snooping or</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if the back door allows
-installation of software changes, a</strong></del></span> <span
class="inserted"><ins><em>product will stop working</a>. <a
+ <p>Sonos</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+ told all its customers, “Agree”
+ to snooping or the product will stop working</a>. <a
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
- Another article</a> says they won't forcibly</em></ins></span>
change <span class="removed"><del><strong>could</strong></del></span> <span
class="inserted"><ins><em>the software, but
- people won't</em></ins></span> be <span
class="removed"><del><strong>installed that
-would give access</strong></del></span> <span
class="inserted"><ins><em>able</em></ins></span> to <span
class="removed"><del><strong>the customer's data.
-</p></strong></del></span> <span class="inserted"><ins><em>get any
upgrades and eventually it will
- stop working.</p></em></ins></span>
+ Another article</a> says they won't forcibly change the software, but
+ people won't be able to get any upgrades</em></ins></span> and <span
class="inserted"><ins><em>eventually</em></ins></span> it <span
class="removed"><del><strong>claims that “artists” (rather than
companies) are
+primarily responsible for putting digital restrictions management into
+these disks. Nonetheless, it is</strong></del></span> <span
class="inserted"><ins><em>will
+ stop working.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
-Some D-Link routers</a> have</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>back door for changing
settings</strong></del></span> <span class="inserted"><ins><em>DJI drone
- to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>a
-dlink of an eye.</p>
+ <li id="M201708040">
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>reference for the facts.
+</p>
-<p></strong></del></span> <span class="inserted"><ins><em>many
cases</em></ins></span> <a <span
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764">Many</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+<p>Every Bluray disk (with few, rare exceptions) has DRM—so
+don't use Bluray disks!</p></strong></del></span> <span
class="inserted"><ins><em>DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
- <li id="M201706200">
- <p>Many</em></ins></span> models of <span
class="removed"><del><strong>routers</strong></del></span> <span
class="inserted"><ins><em>Internet-connected cameras
- are tremendously insecure. They</em></ins></span> have <span
class="removed"><del><strong>back doors</a>.</p>
-</li>
-
-<li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router has a backdoor</a>.</p>
-</li>
-
-<li>
-<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer was designed</strong></del></span> <span
class="inserted"><ins><em>login
- accounts</em></ins></span> with <span
class="removed"><del><strong>DRM</a>: it won't accept
-third-party printing materials. It</strong></del></span> <span
class="inserted"><ins><em>hard-coded passwords, which can't be changed, and
<a
-
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</em></ins></span>
- is <span class="removed"><del><strong>the Keurig of printers. Now
it</strong></del></span> <span class="inserted"><ins><em>no way to delete these
accounts either</a>.</p>
+ <li <span class="removed"><del><strong>id="cameras-bugs">
+<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>id="M201706200">
+ <p>Many models</em></ins></span> of <span
class="removed"><del><strong>network-connected
surveillance</strong></del></span> <span
class="inserted"><ins><em>Internet-connected</em></ins></span> cameras
+ <span class="inserted"><ins><em>are tremendously insecure.
They</em></ins></span> have <span class="inserted"><ins><em>login
+ accounts with hard-coded passwords, which can't be changed,
and</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+security bugs that allow anyone to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts either</a>.</p>
</li>
<li id="M201705250">
<p>The proprietary code that runs pacemakers,
- insulin pumps, and other medical devices</em></ins></span> is
-<span class="removed"><del><strong>being discontinued, which
means</strong></del></span> <span class="inserted"><ins><em><a
+ insulin pumps, and other medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
security faults</a>.</p>
</li>
<li id="M201705180">
<p>Bird and rabbit pets were implemented for Second
- Life by a company</em></ins></span> that <span
class="removed"><del><strong>eventually authorized materials won't
-be available</strong></del></span> <span class="inserted"><ins><em>tethered
their food to a server. <a
+ Life by a company that tethered their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down the server</em></ins></span> and the <span
class="removed"><del><strong>printers may become unusable.</p>
-
-<p>With a</strong></del></span> <span class="inserted"><ins><em>pets
more or less died</a>.</p>
+ It shut down the server and the pets more or less died</a>.</p>
</li>
<li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>.
Specifically,</em></ins></span>
- the <span class="removed"><del><strong>Respects Your Freedom</a>,
this problem</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> would <span
class="removed"><del><strong>not
-even be a remote possibility.</p>
-
-<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>record</em></ins></span> the <span
class="removed"><del><strong>author</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of <span
class="removed"><del><strong>that article says that there was
-“nothing wrong” with designing</strong></del></span> the <span
class="removed"><del><strong>device to restrict</strong></del></span> <span
class="inserted"><ins><em>audio files</em></ins></span> users <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>listen to
- along with</em></ins></span> the <span class="removed"><del><strong>first
place. This is like putting a “cheat me and mistreat me”
-sign on your chest. We should know better: we should condemn all
companies</strong></del></span> <span class="inserted"><ins><em>headphone's
unique serial number.</p>
-
- <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>take advantage of people like him. Indeed, it
is</strong></del></span> <span class="inserted"><ins><em>this was done
without</em></ins></span> the <span
class="removed"><del><strong>acceptance</strong></del></span> <span
class="inserted"><ins><em>users' consent.
- If the fine print</em></ins></span> of
-<span class="removed"><del><strong>their unjust practice</strong></del></span>
<span class="inserted"><ins><em>the app said</em></ins></span> that <span
class="removed"><del><strong>teaches people to</strong></del></span> <span
class="inserted"><ins><em>users gave consent for this,
- would that make it acceptable? No way! It should</em></ins></span> be
<span class="removed"><del><strong>doormats.</p>
-</li>
-
-<li>
-<p>Philips “smart” lightbulbs</strong></del></span> <span
class="inserted"><ins><em>flat out</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
-have been designed not</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span
class="removed"><del><strong>interact</strong></del></span> <span
class="inserted"><ins><em>design
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
the app to snoop at all</a>.</p>
</li>
<li id="M201704120">
- <p>Anova sabotaged users' cooking devices</em></ins></span>
- with <span class="removed"><del><strong>other companies' smart
-lightbulbs</a>.</p>
-
-<p>If</strong></del></span> a <span class="removed"><del><strong>product
is “smart”, and you didn't build it, it is
-cleverly serving</strong></del></span> <span
class="inserted"><ins><em>downgrade that tethered them to a remote server. <a
+ <p>Anova sabotaged users' cooking devices
+ with a downgrade that tethered them to a remote server. <a
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless
users create an account on Anova's servers, their cookers won't
function</a>.</p>
@@ -525,7 +567,7 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</em></ins></span> its <span
class="inserted"><ins><em>users through the proprietary control
app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
@@ -560,16 +602,11 @@
Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the</em></ins></span> manufacturer <span
class="removed"><del><strong><em>against
you</em>.</p></strong></del></span> <span
class="inserted"><ins><em>and the FBI could listen to these
- conversations was unacceptable by itself.</p></em></ins></span>
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by itself.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-DVDs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702200">
+ <li id="M201702200">
<p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
@@ -653,7 +690,7 @@
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.</p>
- <p>A camera that records locally on physical
media,</em></ins></span> and <span class="removed"><del><strong>Bluray
disks</strong></del></span> <span class="inserted"><ins><em>has no network
+ <p>A camera that records locally on physical media, and has no
network
connection, does not threaten people with surveillance—neither
by watching people through the camera, nor through malware in the
camera.</p>
@@ -669,38 +706,34 @@
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance
cameras</em></ins></span> have <span class="removed"><del><strong>DRM</a>.
-</p>
-
-<p>That page uses spin terms</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
-including</strong></del></span> <span class="inserted"><ins><em>allow anyone
to watch through them</a>.</p>
+ security bugs that allow anyone to</em></ins></span> watch through
them</a>.</p>
</li>
- <li id="M201601100">
- <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+<span class="removed"><del><strong><li>
+<p>Samsung's “Smart Home”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601100">
+ <p>The <a
+ href="http://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed with DRM</a>: it
won't accept third-party printing materials. It is the Keurig of
printers. Now it is being discontinued, which means that eventually
- authorized materials won't be available</em></ins></span> and <span
class="inserted"><ins><em>the printers may become
+ authorized materials won't be available and the printers may become
unusable.</p>
- <p>With a</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ <p>With a <a
+ href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
printer that gets the Respects Your Freedom</a>, this problem would
not even be a remote possibility.</p>
<p>How pitiful that the author of that article says that there was
“nothing wrong” with designing the device to restrict
- users in the first place. This is like putting a “cheat
me</em></ins></span> and
- <span class="inserted"><ins><em>mistreat me” sign on your chest. We
should know better: we
+ users in the first place. This is like putting a “cheat me and
+ mistreat me” sign on your chest. We should know better: we
should condemn all companies that take advantage of people like him.
- Indeed,</em></ins></span> it <span
class="removed"><del><strong>claims</strong></del></span> <span
class="inserted"><ins><em>is the acceptance of their unjust
practice</em></ins></span> that <span
class="removed"><del><strong>“artists” (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks. Nonetheless,</strong></del></span> <span
class="inserted"><ins><em>teaches
+ Indeed, it is the acceptance of their unjust practice that teaches
people to be doormats.</p>
</li>
@@ -711,50 +744,37 @@
later the company updated the firmware to disallow
interoperability</a>.</p>
- <p>If a product is “smart”, and you didn't build
it,</em></ins></span>
- it is <span class="inserted"><ins><em>cleverly serving its manufacturer
<em>against you</em>.</p>
+ <p>If a product is “smart”, and you didn't build it,
+ it is cleverly serving its manufacturer <em>against
you</em>.</p>
</li>
<li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have</em></ins></span> a <span
class="removed"><del><strong>reference</strong></del></span> <span
class="inserted"><ins><em>back door</em></ins></span> for <span
class="removed"><del><strong>the facts.
-</p>
-
-<p>Every Bluray disk (with few, rare exceptions)</strong></del></span>
<span class="inserted"><ins><em>changing settings in a
+ Some D-Link routers</a> have a back door for changing settings in a
dlink of an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router</em></ins></span> has <span
class="removed"><del><strong>DRM—so
-don't use Bluray disks!</p>
-</li>
+ router</em></ins></span> has a <span class="removed"><del><strong>big
security hole;</strong></del></span> <span class="inserted"><ins><em>back
door</a>.</p>
-<li id="cameras-bugs">
-<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>a back door</a>.</p>
-
- <p><a href="https://github.com/elvanderb/TCP-32764">Many
models</em></ins></span> of <span
class="removed"><del><strong>network-connected surveillance
cameras</strong></del></span>
- <span class="inserted"><ins><em>routers</em></ins></span> have <span
class="inserted"><ins><em>back doors</a>.</p>
+ <p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
+ routers have back doors</a>.</p>
</li>
<li id="M201511250">
<p>The Nest Cam “smart” camera is</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
-security bugs that allow anyone</strong></del></span>
+<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized people</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
- to <span class="removed"><del><strong>watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Samsung's “Smart Home”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511198">
- <p>ARRIS cable modem</em></ins></span> has a <span
class="removed"><del><strong>big security hole;</strong></del></span> <a
-<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized people</strong></del></span>
- <span
class="inserted"><ins><em>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ <li id="M201511198">
+ <p>ARRIS cable modem has a <a
+
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
back door in the back door</a>.</p>
</li>
@@ -1265,7 +1285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/25 10:31:07 $
+$Date: 2019/02/28 09:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-appliances.de.po 25 Feb 2019 10:31:07 -0000 1.69
+++ malware-appliances.de.po 28 Feb 2019 09:00:38 -0000 1.70
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-25 10:27+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -108,6 +108,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- malware-appliances.fr.po 25 Feb 2019 12:05:44 -0000 1.110
+++ malware-appliances.fr.po 28 Feb 2019 09:00:38 -0000 1.111
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-25 10:27+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-02-25 13:03+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-appliances.pot 25 Feb 2019 10:31:07 -0000 1.54
+++ malware-appliances.pot 28 Feb 2019 09:00:38 -0000 1.55
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-25 10:27+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a "
"href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">
"
"send the video they capture to Amazon servers</a>, which save it long-term."
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-appliances.ru.po 25 Feb 2019 10:31:07 -0000 1.142
+++ malware-appliances.ru.po 28 Feb 2019 09:00:38 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-25 10:27+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- nl.po 25 Feb 2019 10:31:07 -0000 1.36
+++ nl.po 28 Feb 2019 09:00:38 -0000 1.37
@@ -1718,6 +1718,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- pl.po 25 Feb 2019 10:31:07 -0000 1.36
+++ pl.po 28 Feb 2019 09:00:38 -0000 1.37
@@ -1285,6 +1285,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- pot 25 Feb 2019 10:31:07 -0000 1.36
+++ pot 28 Feb 2019 09:00:38 -0000 1.37
@@ -1155,6 +1155,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-drm.de-diff.html 4 Feb 2019 07:31:23 -0000 1.20
+++ proprietary-drm.de-diff.html 28 Feb 2019 09:00:38 -0000 1.21
@@ -50,53 +50,63 @@
<span class="removed"><del><strong><ul>
<li><p>DRM does more nastiness to published works than merely
stopping
-people from looking at and/or copying them. Even when it allows you to
-look, it harasses</strong></del></span>
+people from looking at and/or copying them. Even when it
allows</strong></del></span>
<span class="inserted"><ins><em><div class="important">
-<p>If</em></ins></span> you <span class="removed"><del><strong>in many
ways. Cory Doctorow's article presents
-<a href="https://boingboing.net/2010/02/18/infographic-buying-d.html">
-DVDs as</strong></del></span> <span class="inserted"><ins><em>know
of</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
+<p>If</em></ins></span> you <span class="inserted"><ins><em>know of an
example that ought</em></ins></span> to
+<span class="removed"><del><strong>look, it harasses you</strong></del></span>
<span class="inserted"><ins><em>be</em></ins></span> in <span
class="removed"><del><strong>many ways. Cory Doctorow's article
presents</strong></del></span> <span class="inserted"><ins><em>this page but
isn't
+here, please write
+to</em></ins></span> <a <span
class="removed"><del><strong>href="https://boingboing.net/2010/02/18/infographic-buying-d.html">
+DVDs as an example</a>.</p>
<p>We condemn the propaganda term “pirate” when it is
-applied to people</strong></del></span> <span
class="inserted"><ins><em>example</em></ins></span> that <span
class="removed"><del><strong>share copies. Many of these DVDs are made and
-distributed commercially; in reference</strong></del></span> <span
class="inserted"><ins><em>ought</em></ins></span> to <span
class="removed"><del><strong>that practice,
-“pirate” might</strong></del></span> be <span
class="removed"><del><strong>partly justified. But not when they
-protect users from harassment.</p>
-
-<p>The fundamental cause of this harassment, and the fundamental wrong
-of the DRM</strong></del></span> in <span class="removed"><del><strong>DVDs,
is the requirement to use nonfree software</strong></del></span> <span
class="inserted"><ins><em>this page but isn't
-here, please write</em></ins></span>
-to <span class="removed"><del><strong>play
+applied</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
+to <span class="removed"><del><strong>people that share copies.
Many</strong></del></span> <span class="inserted"><ins><em>inform us. Please
include the URL</em></ins></span> of <span class="removed"><del><strong>these
DVDs are made and
+distributed commercially; in</strong></del></span> <span
class="inserted"><ins><em>a trustworthy</em></ins></span> reference <span
class="inserted"><ins><em>or two</em></ins></span>
+to <span class="removed"><del><strong>that practice,
+“pirate” might be partly justified. But not when they
+protect users from harassment.</p></strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
+</div>
+</div>
+<div class="column-limit" id="proprietary-drm"></div>
+
+<ul class="blurbs">
+ <li id="M201902080"></em></ins></span>
+ <p>The <span class="removed"><del><strong>fundamental cause of this
harassment, and the fundamental wrong
+of the</strong></del></span> <span class="inserted"><ins><em>HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have</em></ins></span> DRM <span
class="removed"><del><strong>in DVDs, is the requirement to use nonfree
software</strong></del></span> <span class="inserted"><ins><em>that constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>play
the DVD. Fortunately we have free replacement software.
</p>
</li>
-<li><p>The Netflix Android app</strong></del></span> <a
-<span
class="removed"><del><strong>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
-forces the use of Google DNS</a>. This is one of the methods that Netflix
-uses</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
-to <span class="removed"><del><strong>enforce the geolocation restrictions
dictated by</strong></del></span> <span class="inserted"><ins><em>inform us.
Please include</em></ins></span> the <span class="removed"><del><strong>movie
+<li><p>The Netflix Android app <a
+href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+forces</strong></del></span> <span class="inserted"><ins><em>make
sure</em></ins></span> the <span class="removed"><del><strong>use of Google
DNS</a>. This</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>one of</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for</em></ins></span> the <span
class="removed"><del><strong>methods that Netflix
+uses to enforce</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>geolocation</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally
unacceptable</em></ins></span>
+ restrictions <span class="removed"><del><strong>dictated
by</strong></del></span> <span class="inserted"><ins><em>in</em></ins></span>
the <span class="removed"><del><strong>movie
studios.</p>
</li>
<li><p><a
href="https://en.wikipedia.org/wiki/High-bandwidth_Digital_Content_Protection">
-HDCP</a> is</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span class="removed"><del><strong>DRM system that
encrypts video and audio data from the
-processor</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
-to <span class="removed"><del><strong>the monitor. It is implemented mainly in
hardware, but
-the system software also participates, which makes it
qualify</strong></del></span> <span
class="inserted"><ins><em>serve</em></ins></span> as
-<span class="removed"><del><strong>malware.</p>
-
-<p>Besides controlling users, HDCP denies their fair-use
rights</strong></del></span> <span class="inserted"><ins><em>specific
substantiation.</p>
-</div>
-</div>
-<div class="column-limit" id="proprietary-drm"></div>
+HDCP</a> is</strong></del></span> <span class="inserted"><ins><em>use
of</em></ins></span> a <span class="removed"><del><strong>DRM
system</strong></del></span> <span
class="inserted"><ins><em>printer</em></ins></span> that <span
class="removed"><del><strong>encrypts video and audio data from the
+processor to the monitor. It is implemented mainly</strong></del></span> <span
class="inserted"><ins><em>would otherwise be</em></ins></span> in <span
class="removed"><del><strong>hardware, but</strong></del></span>
+ <span class="inserted"><ins><em>working order.</p>
+ </li>
-<ul class="blurbs">
<li id="M201810150">
- <p>Printer manufacturers are very innovative—at blocking the
- use of independent replacement ink cartridges. Their “security
+ <p>Printer manufacturers are very innovative—at
blocking</em></ins></span> the <span class="removed"><del><strong>system
software also participates, which makes it qualify as
+malware.</p>
+
+<p>Besides controlling users, HDCP denies their fair-use
rights</strong></del></span>
+ <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
upgrades” occasionally impose new forms of cartridge DRM. <a
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
HP</em></ins></span> and
@@ -140,15 +150,13 @@
not make what Google has done any less wrong.</p>
</li>
-<span class="removed"><del><strong><li><p>Windows DRM
-files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
-be used to identify people browsing through
Tor</a>.</strong></del></span>
+<span
class="removed"><del><strong><li><p>Windows</strong></del></span>
<span class="inserted"><ins><em><li id="M201704130">
- <p><a
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"></em></ins></span>
- The <span class="removed"><del><strong>vulnerability
-exists only if you</strong></del></span> <span
class="inserted"><ins><em>Amazon Kindle has DRM</a>. That article is
flawed in that it
- fails to treat DRM as an ethical question; it takes for granted that
+ <p><a
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
+ The Amazon Kindle has DRM</a>. That article is flawed in that it
+ fails to treat</em></ins></span> DRM
+<span class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>as an ethical question; it takes for granted that
whatever Amazon might do to its users is legitimate. It refers to
DRM as digital “rights” management, which is the spin
term used to promote DRM. Nonetheless it serves as a reference for
@@ -168,19 +176,19 @@
“Unauthorized” essentially means anyone besides
Apple.</p>
<p>The article uses the term “lock”
- to describe the DRM, but we prefer to</em></ins></span> use <span
class="removed"><del><strong>Windows.
-</p></li>
-
-<li></strong></del></span> <span class="inserted"><ins><em>the term <a
- href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
+ to describe the DRM, but we prefer to use the term</em></ins></span> <a
<span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks">
digital
handcuffs</a>.</p>
</li>
<li id="M201702020">
- <p>DRM-restricted files can be used to <a
-
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">
+ <p>DRM-restricted files can</em></ins></span> be used to <span
class="inserted"><ins><em><a
+
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"></em></ins></span>
identify people browsing through Tor</a>. The vulnerability exists
- only if you use Windows.</p>
+ only if you use <span class="removed"><del><strong>Windows.
+</p></li>
+
+<li></strong></del></span> <span
class="inserted"><ins><em>Windows.</p>
</li>
<li id="M201701300"></em></ins></span>
@@ -483,7 +491,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/28 09:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-drm.de.po 5 Jan 2019 11:31:34 -0000 1.61
+++ proprietary-drm.de.po 28 Feb 2019 09:00:38 -0000 1.62
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -105,6 +105,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-drm.fr.po 5 Jan 2019 16:13:43 -0000 1.59
+++ proprietary-drm.fr.po 28 Feb 2019 09:00:38 -0000 1.60
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-01-05 17:13+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -91,6 +92,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-drm.it-diff.html 8 Feb 2019 09:30:04 -0000 1.34
+++ proprietary-drm.it-diff.html 28 Feb 2019 09:00:38 -0000 1.35
@@ -62,6 +62,20 @@
<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201810150">
<p>Printer manufacturers are very innovative—at blocking the
use of independent replacement ink cartridges. Their “security
@@ -224,15 +238,9 @@
<span class="removed"><del><strong><li>
<p><a
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
-The Amazon Kindle has DRM</a>. That article</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201501030">
- <p id="netflix-app-geolocation-drm">The Netflix Android app <a
-
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
- forces the use of Google DNS</a>. This</em></ins></span> is <span
class="removed"><del><strong>flawed in that it
-fails to treat DRM as an ethical question; it takes for
granted</strong></del></span> <span class="inserted"><ins><em>one of the
methods</em></ins></span> that
-<span class="removed"><del><strong>whatever Amazon might do to its users is
legitimate. It refers</strong></del></span>
- <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span
class="removed"><del><strong>DRM
+The Amazon Kindle has DRM</a>. That article is flawed in that it
+fails to treat DRM as an ethical question; it takes for granted that
+whatever Amazon might do to its users is legitimate. It refers to DRM
as digital “rights” management, which is the spin term
used to promote DRM. Nonetheless it serves as a reference for the
facts.
@@ -248,8 +256,13 @@
<li>
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
-in Windows</a>, introduced to cater to <a
href="#bluray">Bluray</a>
-disks. (The article talks about how the same malware would later be
+in Windows</a>, introduced to cater to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201501030">
+ <p id="netflix-app-geolocation-drm">The Netflix Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="#bluray">Bluray</a>
+disks. (The article talks about how</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+ forces</em></ins></span> the <span class="removed"><del><strong>same
malware would later be
introduced in MacOS. That had not been done at the time, but it was
done subsequently.)
</p>
@@ -257,8 +270,9 @@
<li>
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">DRM
-in MacOS</a>. This article focuses on the fact that a new model of
-Macbook introduced a requirement for monitors to have malicious
+in MacOS</a>.</strong></del></span> <span class="inserted"><ins><em>use
of Google DNS</a>.</em></ins></span> This <span
class="removed"><del><strong>article focuses on</strong></del></span> <span
class="inserted"><ins><em>is one of</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>methods</em></ins></span> that <span
class="removed"><del><strong>a new model of
+Macbook introduced a requirement for monitors</strong></del></span>
+ <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span
class="removed"><del><strong>have malicious
hardware, but DRM software in MacOS is involved in
activating</strong></del></span> <span
class="inserted"><ins><em>enforce</em></ins></span> the
<span class="removed"><del><strong>hardware. The software for accessing
iTunes is also responsible.
</p>
@@ -312,10 +326,12 @@
<p>Every Bluray disk (with few, rare exceptions) has DRM—so
don't use Bluray <span class="removed"><del><strong>disks!
-</p></strong></del></span> <span
class="inserted"><ins><em>disks!</p>
+</p></strong></del></span> <span
class="inserted"><ins><em>disks!</p></em></ins></span>
</li>
- <li id="M201102250">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201102250">
<p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">
contains facilities specifically to support DRM</a>.</p>
@@ -336,12 +352,10 @@
<p>The fundamental cause of this harassment, and the fundamental
wrong of the DRM in DVDs, is the requirement to use nonfree software
- to play the DVD. Fortunately we have free replacement
software.</p></em></ins></span>
+ to play the DVD. Fortunately we have free replacement software.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200811210"></em></ins></span>
+ <li id="M200811210"></em></ins></span>
<p><a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"></em></ins></span>
DRM <span class="inserted"><ins><em>(digital restrictions
mechanisms)</em></ins></span> in <span class="removed"><del><strong>Cars Will
Drive Consumers Crazy</a>.
@@ -445,7 +459,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/28 09:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-drm.it.po 8 Feb 2019 08:59:36 -0000 1.51
+++ proprietary-drm.it.po 28 Feb 2019 09:00:38 -0000 1.52
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2017-12-30 14:17+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -99,6 +99,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-drm.ja-diff.html 4 Feb 2019 07:31:23 -0000 1.33
+++ proprietary-drm.ja-diff.html 28 Feb 2019 09:00:38 -0000 1.34
@@ -63,6 +63,20 @@
<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201810150">
<p>Printer manufacturers are very innovative—at blocking the
use of independent replacement ink cartridges. Their “security
@@ -438,7 +452,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/28 09:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-drm.ja.po 5 Jan 2019 11:31:34 -0000 1.46
+++ proprietary-drm.ja.po 28 Feb 2019 09:00:38 -0000 1.47
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:55+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -84,6 +84,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary-drm.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-drm.pot 5 Jan 2019 11:31:34 -0000 1.29
+++ proprietary-drm.pot 28 Feb 2019 09:00:38 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -69,6 +69,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a "
Index: proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary-drm.ru.po 25 Feb 2019 09:37:05 -0000 1.79
+++ proprietary-drm.ru.po 28 Feb 2019 09:00:38 -0000 1.80
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-10-08 17:34+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -91,6 +92,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-subscriptions.de-diff.html 4 Feb 2019 07:31:23 -0000
1.16
+++ proprietary-subscriptions.de-diff.html 28 Feb 2019 09:00:38 -0000
1.17
@@ -54,7 +54,21 @@
<div class="column-limit"
id="proprietary-subscriptions"></div></em></ins></span>
<ul class="blurbs">
- <li id="M201711010">
+ <li <span class="inserted"><ins><em>id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
+ <li</em></ins></span> id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
with a universal back door, and tethered to a server that requires
@@ -156,7 +170,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/28 09:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-subscriptions.de.po 5 Jan 2019 11:31:35 -0000 1.20
+++ proprietary-subscriptions.de.po 28 Feb 2019 09:00:38 -0000 1.21
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -91,6 +91,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Sony has brought back its robotic pet Aibo, this time <a href=\"https://"
"motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
"subscription-to-a-robot-dog-aibo-90s-pet\"> with a universal back door, and "
Index: proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-subscriptions.fr.po 5 Jan 2019 16:13:44 -0000 1.27
+++ proprietary-subscriptions.fr.po 28 Feb 2019 09:00:38 -0000 1.28
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-01-05 17:13+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -76,6 +77,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Sony has brought back its robotic pet Aibo, this time <a href=\"https://"
"motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
"subscription-to-a-robot-dog-aibo-90s-pet\"> with a universal back door, and "
Index: proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-subscriptions.ja-diff.html 4 Feb 2019 07:31:23 -0000
1.23
+++ proprietary-subscriptions.ja-diff.html 28 Feb 2019 09:00:38 -0000
1.24
@@ -56,6 +56,20 @@
<div class="column-limit" id="proprietary-subscriptions"></div>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
@@ -159,7 +173,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/28 09:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-subscriptions.ja.po 5 Jan 2019 11:31:35 -0000 1.14
+++ proprietary-subscriptions.ja.po 28 Feb 2019 09:00:39 -0000 1.15
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2016-09-16 09:36+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -73,6 +73,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Sony has brought back its robotic pet Aibo, this time <a href=\"https://"
"motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
"subscription-to-a-robot-dog-aibo-90s-pet\"> with a universal back door, and "
Index: proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-subscriptions.pot 5 Jan 2019 11:31:35 -0000 1.14
+++ proprietary-subscriptions.pot 28 Feb 2019 09:00:39 -0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -60,6 +60,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Sony has brought back its robotic pet Aibo, this time <a "
"href=\"https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet\">
"
"with a universal back door, and tethered to a server that requires a "
Index: proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-subscriptions.ru.po 25 Feb 2019 09:37:05 -0000 1.32
+++ proprietary-subscriptions.ru.po 28 Feb 2019 09:00:39 -0000 1.33
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-06-23 09:13+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -77,6 +78,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Sony has brought back its robotic pet Aibo, this time <a href=\"https://"
"motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-"
"subscription-to-a-robot-dog-aibo-90s-pet\"> with a universal back door, and "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-surveillance.de-diff.html 25 Feb 2019 10:31:07 -0000
1.48
+++ proprietary-surveillance.de-diff.html 28 Feb 2019 09:00:39 -0000
1.49
@@ -327,7 +327,8 @@
</li>
<span class="removed"><del><strong><li><p>
Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
- ships with default settings that show no regard</strong></del></span>
+ ships with default settings that show no regard for the
+ privacy of its users</a>, giving Microsoft</strong></del></span>
<span class="inserted"><ins><em><li id="M201508180">
<p><a
@@ -347,8 +348,8 @@
<li id="M201507300">
<p>Windows 10 <a
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
- ships with default settings that show no regard</em></ins></span> for the
privacy of
- its users</a>, giving Microsoft the “right” to snoop on
+ ships with default settings that show no regard for the privacy of
+ its users</a>, giving Microsoft</em></ins></span> the
“right” to snoop on
the users' files, text input, voice input, location info, contacts,
calendar records and web browsing history, as well as automatically
connecting the machines to open hotspots and showing targeted <span
class="removed"><del><strong>ads.</p></li>
@@ -490,7 +491,12 @@
that Apple has not talked about</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p><a</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms to Apple.</p>
+ </li>
+</ul>
+
+<p>There's</strong></del></span>
<span class="inserted"><ins><em><li id="M201410200">
<p>Various operations in <a
@@ -499,14 +505,14 @@
</li>
<li id="M201401100.1">
- <p><a</em></ins></span>
+ <p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
</li>
</ul>
-<p>There's a lot more <a href="#SpywareIniThings">iThing
spyware</a>, and
+<p>There's</em></ins></span> a lot more <a
href="#SpywareIniThings">iThing spyware</a>, and
<a href="/proprietary/malware-apple.html">Apple
malware</a>.</p>
@@ -529,12 +535,24 @@
Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>emails to
snoopers</a>.</p>
- <p>Google</strong></del></span> <span
class="inserted"><ins><em>spyware via
- BIOS</a> on Windows installs. Note that the specific
- sabotage method Lenovo used</em></ins></span> did not <span
class="removed"><del><strong>intend</strong></del></span> <span
class="inserted"><ins><em>affect GNU/Linux; also, a
+ <p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
+ BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
+ worked in various ways to prevent that, and deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares</strong></del></span> <span
class="inserted"><ins><em>specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft puts in its
- own malware</a>.</p>
+ href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
+ being nonfree. It also distributes</strong></del></span> its
+ own <span class="removed"><del><strong>nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
</li>
</ul>
@@ -553,27 +571,42 @@
<ul class="blurbs">
<li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to make <span
class="removed"><del><strong>these apps spy; on</strong></del></span> <span
class="inserted"><ins><em>sure they can't “fool”</em></ins></span>
- the <span class="removed"><del><strong>contrary, it
- worked in various ways</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
+ cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
+ users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
+ proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
+ <span class="removed"><del><strong>do.</p>
+
+ <p>Google could demand the source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>can't
“fool”</em></ins></span>
+ the
+ <span class="removed"><del><strong>source code
somehow</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>prevent that,</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>Edward
Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the <span
class="removed"><del><strong>snooping of these apps.</p>
+ them</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
- <p>On</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
- text messages, read call, location</em></ins></span> and
- <span class="removed"><del><strong>therefore shares
in</strong></del></span> <span class="inserted"><ins><em>web browsing history,
and
- read</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is designed to disguise
itself
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>phones on and off,
listen</em></ins></span> to the
+ <span class="removed"><del><strong>public, so we can depend on each
other.</p>
+</li>
+<li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span> <span
class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>security
+ of 283 Android VPN apps concluded that “in spite of the
+ promises for privacy, security,</strong></del></span> <span
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span
class="removed"><del><strong>anonymity given by</strong></del></span>
+ <span class="inserted"><ins><em>read</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is
designed</em></ins></span> to <span class="removed"><del><strong>poor security
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -581,25 +614,37 @@
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>injustice of their
- being nonfree.</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
- phones have.</em></ins></span> It <span class="removed"><del><strong>also
distributes its own nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
+ Android,</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
+ VPN apps.”</p>
- <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there</em></ins></span>
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN
apps from
+ the research paper</strong></del></span> <span
class="inserted"><ins><em>not much
+ detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>preventing
apps</strong></del></span> <span class="inserted"><ins><em>bugs in the phones'
radio software</a>.</p>
+ lots</em></ins></span> of
+ <span class="removed"><del><strong>users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> the <span
class="removed"><del><strong><code>READ_SMS</code></strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong><code>SEND_SMS</code>
+ permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>users cannot stop
+ them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>has full access</strong></del></span> <span
class="inserted"><ins><em>will eventually require all new portable
phones</em></ins></span>
+ to
+ <span class="removed"><del><strong>users' text messages.</dd>
+
+ <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
</li>
</ul>
@@ -611,38 +656,63 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
+ for other apps and also core system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>stores detailed logs
+ and may turn them over</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
+ <p>In</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
+ “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="removed"><del><strong>JS injection is</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p>
</li>
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ to use</em></ins></span> it <span class="removed"><del><strong>redirects
the
+ user's traffic through valueclick.com (an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers of this
app</strong></del></span> <span class="inserted"><ins><em>without having your
fingerprints taken. Users would</em></ins></span> have
+ <span class="removed"><del><strong>confirmed that the non-premium
version of</strong></del></span>
+ <span class="inserted"><ins><em>no way to tell whether</em></ins></span>
the <span class="removed"><del><strong>app does
+ JavaScript injection for tracking and display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>phone is
snooping on them.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <li id="M201611170">
+ <span class="inserted"><ins><em><li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data to Apple's servers</a>. Big Brother can get
+ lots</em></ins></span> of <span class="inserted"><ins><em>personal data to
Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the photos
+ <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -651,13 +721,13 @@
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means “please
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>paid proprietary
apps,</strong></del></span>
+ <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
<p>There is a way to
<a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so it still counts as a
+ iCloud</a>, but it's active by default so</em></ins></span> it <span
class="removed"><del><strong>was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>still counts as a
surveillance functionality.</p>
<p>Unknown people apparently took advantage of this to <a
@@ -702,8 +772,8 @@
is totally incompetent</a>.</p>
</li>
- <li id="M201308080">
- <p>The iThing also <a
+ <li id="M201308080"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
@@ -712,7 +782,7 @@
<li id="M201210170">
<p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it is
+ enabled by default</a>. (That</em></ins></span> article <span
class="removed"><del><strong>confusingly describes gratis apps as
“free”,</strong></del></span> <span class="inserted"><ins><em>talks
about iOS 6,</em></ins></span> but <span
class="removed"><del><strong>most</strong></del></span> <span
class="inserted"><ins><em>it is
still true in iOS 7.)</p>
</li>
@@ -735,8 +805,7 @@
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically</em></ins></span> from
- <span class="removed"><del><strong>cheating? There</strong></del></span>
<span class="inserted"><ins><em>Android phones</a> while disguising
+ upload call logs automatically from Android phones</a> while
disguising
what the “consent” was for.</p>
</li>
@@ -750,83 +819,94 @@
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ sold with spyware sending lots</em></ins></span> of <span
class="removed"><del><strong>them are not in fact</strong></del></span> <span
class="inserted"><ins><em>data to China</a>.</p>
</li>
<li id="M201609140">
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ <p>Google Play (a component of Android)</em></ins></span> <a
<span class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>users'
movements without their permission</a>.</p>
<p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
+ disable Google Play itself to completely stop the tracking.
This</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span class="inserted"><ins><em>yet another example of nonfree software
pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
+ unthinkable with free software.</p></em></ins></span>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they send so much data that their
- transmission</em></ins></span> is <span class="removed"><del><strong>no
systematic way</strong></del></span> <span class="inserted"><ins><em>a
substantial expense</em></ins></span> for <span
class="removed"><del><strong>Google,</strong></del></span> <span
class="inserted"><ins><em>users. Said transmission,
- not wanted</em></ins></span> or <span class="removed"><del><strong>Android
- users, to inspect executable proprietary apps</strong></del></span> <span
class="inserted"><ins><em>requested by the user, clearly must constitute spying
- of some kind.</p>
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make
sure</em></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</em></ins></span>
+ that <span class="inserted"><ins><em>users can't delete</a>,
and</em></ins></span> they <span class="removed"><del><strong>don't
snoop.</p>
+ <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>send so much data</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p></em></ins></span>
</li>
- <li id="M201403120">
- <p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to <span
class="removed"><del><strong>see what they
- do.</p>
+<span class="removed"><del><strong><li>
+ <p>A study found 234</strong></del></span>
- <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>any file on</em></ins></span> the <span
class="removed"><del><strong>source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>system.</p>
+ <span class="inserted"><ins><em><li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the
system.</p>
</li>
<li id="M201308010">
- <p>Spyware in Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports that <a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the
- <span class="removed"><del><strong>source code somehow to determine
whether they mistreat users</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and
microphone</em></ins></span> in
- <span class="removed"><del><strong>various ways. If it
did</strong></del></span> <span class="inserted"><ins><em>Android phones
+ <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps that track users</strong></del></span> <span
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us</em></ins></span> by <span
class="inserted"><ins><em>a paywall) reports that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone</em></ins></span> in
<span class="removed"><del><strong>stores or played by TV programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>Android phones
and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
</li>
- <li id="M201307280">
+<span class="removed"><del><strong><li>
+ <p>Pairs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
<p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use</em></ins></span> a <span class="removed"><del><strong>good
job</strong></del></span> <span class="inserted"><ins><em>modified
version</em></ins></span> of <span class="removed"><del><strong>this, it could
more or less
- prevent such snooping, except when</strong></del></span> <span
class="inserted"><ins><em>Android that <a
+ by Google, use a modified version</em></ins></span> of Android <span
class="removed"><del><strong>apps can collude to transmit
users'</strong></del></span> <span class="inserted"><ins><em>that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
+ sends</em></ins></span> personal data to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola phone <a
-
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="inserted"><ins><em>time</a>.</p>
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
- <p>Google Play intentionally sends</em></ins></span> app developers
<span class="removed"><del><strong>are clever</strong></del></span> <span
class="inserted"><ins><em><a
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150"></em></ins></span>
+ <p>Google Play intentionally sends app developers <a
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ the personal details of users that <span
class="removed"><del><strong>install the app</a>.</p>
- <p>Merely asking the “consent” of users is
not</em></ins></span> enough to <span
class="removed"><del><strong>outsmart</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
+<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>install the app</a>.</p>
- <p>But since Google itself develops malicious apps, we cannot
trust</strong></del></span> <span class="inserted"><ins><em>“Terms and
Conditions” that spell out what
- they are “consenting” to.</em></ins></span> Google <span
class="inserted"><ins><em>should clearly and
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
honestly identify the information it collects on users, instead of
hiding it in an obscurely worded EULA.</p>
- <p>However,</em></ins></span> to <span
class="inserted"><ins><em>truly</em></ins></span> protect <span
class="removed"><del><strong>us. We</strong></del></span> <span
class="inserted"><ins><em>people's privacy, we</em></ins></span> must <span
class="removed"><del><strong>demand release of source code
to</strong></del></span> <span class="inserted"><ins><em>prevent Google
- and other companies from getting this personal information
in</em></ins></span> the
- <span class="removed"><del><strong>public, so we</strong></del></span>
- <span class="inserted"><ins><em>first place!</p>
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
<li id="M201111170">
@@ -844,24 +924,21 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books</em></ins></span> can <span
class="removed"><del><strong>depend</strong></del></span> <span
class="inserted"><ins><em>contain JavaScript code, and <a
+ <p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>each other.</p></strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p></em></ins></span>
+ sometimes this code snoops on readers</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A</strong></del></span>
- <span class="inserted"><ins><em><li id="M201410080">
+ <li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ the e-reader used by most US libraries, <a
+
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>privacy and security</strong></del></span>
<span class="inserted"><ins><em>Kindle: <a
+ <p>Spyware in many e-readers—not only the Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
report even which page the user reads at what time</a>.</p>
</li>
@@ -885,19 +962,14 @@
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot</em></ins></span> of <span
class="removed"><del><strong>283 Android VPN apps
concluded</strong></del></span> <span class="inserted"><ins><em>money.</p>
+ often a legal threat demanding a lot of money.</p>
- <p>The fact</em></ins></span> that <span
class="removed"><del><strong>“in spite of the
- promises</strong></del></span> <span class="inserted"><ins><em>this is
used</em></ins></span> for <span class="removed"><del><strong>privacy,
security, and anonymity given by the
- majority</strong></del></span> <span
class="inserted"><ins><em>repression</em></ins></span> of <span
class="removed"><del><strong>VPN apps—millions</strong></del></span>
<span class="inserted"><ins><em>forbidden sharing
+ <p>The fact that this is used for repression of forbidden sharing
makes it even more vicious.</p>
- <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="removed"><del><strong>users may be
unawarely subject
- to poor security guarantees and abusive practices inflicted by
- VPN apps.”</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>nonfree software</em></ins></span>
- is <span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>cure for the injustice</em></ins></span> of <span
class="removed"><del><strong>proprietary VPN</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
+ <p>This illustrates that making unauthorized
copies</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>nonfree software</em></ins></span>
+ is not <span class="removed"><del><strong>enough
+to legitimize actions like this. At this point, most
users</strong></del></span> <span class="inserted"><ins><em>a cure for the
injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
</ul>
@@ -909,66 +981,44 @@
<ul class="blurbs">
<li id="M201902060">
- <p>Many nonfree</em></ins></span> apps <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em>have a surveillance feature for <a
+ <p>Many nonfree apps</em></ins></span> have
+<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>research paper that tracks and
infringes</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with</em></ins></span> the <span
class="removed"><del><strong>privacy of
- users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ recording all</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious
functionalities,</em></ins></span> such as <span
class="removed"><del><strong>NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access
to</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Twenty nine “beauty camera” apps</em></ins></span>
that <span class="removed"><del><strong>spell out
+what they are “consenting” to.</strong></del></span> <span
class="inserted"><ins><em>used to
+ be on</em></ins></span> Google <span class="removed"><del><strong>should
clearly</strong></del></span> <span class="inserted"><ins><em>Play had one or
more malicious functionalities, such as <a
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing</em></ins></span> users' <span class="removed"><del><strong>text
messages.</dd>
-
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read logs
- for other apps</strong></del></span> <span
class="inserted"><ins><em>photos</a> instead of “beautifying”
them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed
logs</strong></del></span> <span class="inserted"><ins><em>often malicious ads
on users,</em></ins></span> and <span class="removed"><del><strong>may
turn</strong></del></span> <span
class="inserted"><ins><em>redirecting</em></ins></span>
- them <span class="removed"><del><strong>over to the UK government if
- requested.</dd>
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>honestly identify the information it
collects</strong></del></span> <span class="inserted"><ins><em>often malicious
ads</em></ins></span> on users, <span
class="removed"><del><strong>instead</strong></del></span> <span
class="inserted"><ins><em>and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface</em></ins></span> of <span
class="removed"><del><strong>hiding it in an obscurely worded EULA.</p>
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> to <span class="inserted"><ins><em>phishing
sites that stole their credentials. Furthermore,</em></ins></span>
- the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span class="inserted"><ins><em>user
interface</em></ins></span> of <span class="removed"><del><strong>the JS
injection is</strong></del></span> <span class="inserted"><ins><em>most of them
was designed</em></ins></span> to <span class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also, it redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,
and</strong></del></span> <span class="inserted"><ins><em>make uninstallation
+<p>However,</strong></del></span> <span class="inserted"><ins><em>most
of them was designed</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
+and other companies</strong></del></span> <span class="inserted"><ins><em>make
uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should</em></ins></span> also <span
class="removed"><del><strong>uses
- roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way</em></ins></span> of <span
class="removed"><del><strong>this app have
- confirmed that the non-premium version</strong></del></span> <span
class="inserted"><ins><em>knowing what they really do.</p>
+ haven't yet, but they should also stay away</em></ins></span> from <span
class="removed"><del><strong>getting this personal
information</strong></del></span> <span class="inserted"><ins><em>nonfree
apps</em></ins></span> in <span class="removed"><del><strong>the first
+place!</p></strong></del></span>
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <li id="M201902010">
- <p>An investigation</em></ins></span> of the <span
class="removed"><del><strong>app does
- JavaScript injection for tracking and display ads.</dd>
- </dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span> <span class="inserted"><ins><em>150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>2015</a></strong></del></span> <span
class="inserted"><ins><em>Google Play found that <a
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation</em></ins></span> of <span
class="removed"><del><strong>Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable</strong></del></span> <span class="inserted"><ins><em>150 most
popular
+ gratis VPN apps in</em></ins></span> Google Play <span
class="removed"><del><strong>itself</strong></del></span> <span
class="inserted"><ins><em>found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
@@ -976,46 +1026,28 @@
potentially also be used to spy on users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had</em></ins></span> found
that <span class="removed"><del><strong>90%</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of
- the <span class="removed"><del><strong>top-ranked</strong></del></span>
<span class="inserted"><ins><em>top 10</em></ins></span> gratis
- <span class="removed"><del><strong>proprietary Android</strong></del></span>
<span class="inserted"><ins><em>VPN</em></ins></span> apps <span
class="removed"><del><strong>contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis</strong></del></span>
<span class="inserted"><ins><em>have lousy privacy policies</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
<p>It is unfortunate that these articles talk about “free
- apps.” These</em></ins></span> apps <span
class="removed"><del><strong>as “free”,</strong></del></span> <span
class="inserted"><ins><em>are gratis,</em></ins></span> but <span
class="removed"><del><strong>most of them</strong></del></span> <span
class="inserted"><ins><em>they</em></ins></span> are <span
class="removed"><del><strong>not in fact</strong></del></span> <span
class="inserted"><ins><em><em>not</em></em></ins></span> <a
- href="/philosophy/free-sw.html">free <span
class="removed"><del><strong>software</a>.
- It also uses</strong></del></span> <span
class="inserted"><ins><em>software</a>.</p>
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The
company</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly
always</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding</em></ins></span>
that <span class="removed"><del><strong>will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps,</strong></del></span> <span
class="inserted"><ins><em>it notify the</em></ins></span> users <span
class="removed"><del><strong>could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>of what
it will do
- with the data.</p>
-
- <p>I think</em></ins></span> that <span
class="removed"><del><strong>they don't snoop.</p>
- <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>lawsuit is about a side issue. What the company
does
- with the data is a secondary issue. The principal wrong here
is</em></ins></span> that <span class="removed"><del><strong>they
don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps</strong></del></span>
- <span class="inserted"><ins><em>the company gets</em></ins></span> that
<span class="removed"><del><strong>track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>data
at all.</p>
+ stored users' locations</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The
company</em></ins></span> is
+ <span class="removed"><del><strong>yet another
example</strong></del></span>
+ <span class="inserted"><ins><em>being sued, demanding that it notify the
users</em></ins></span> of <span class="removed"><del><strong>nonfree software
pretending to obey</strong></del></span> <span class="inserted"><ins><em>what
it will do
+ with</em></ins></span> the <span class="removed"><del><strong>user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
+ unthinkable</strong></del></span> <span class="inserted"><ins><em>side
issue. What the company does</em></ins></span>
+ with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span class="inserted"><ins><em>the
data is a secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1023,187 +1055,82 @@
tracking people's locations.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
<span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40%</em></ins></span> of <span
class="inserted"><ins><em>gratis</em></ins></span> Android apps <span
class="removed"><del><strong>can collude</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions</em></ins></span> to <span
class="removed"><del><strong>transmit users' personal</strong></del></span>
<span class="inserted"><ins><em>Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span> <span
class="inserted"><ins><em>it obtains from the same machine via
- various apps. Some</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>them send Facebook detailed information about
- the user's activities in the app; others only say</em></ins></span> that
<span class="removed"><del><strong>collude</a>.</p>
-</li>
+ <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>gratis</em></ins></span> Android apps <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a> of their users with third
parties.</p>
+ </li>
-<li>
-<p>Google Play intentionally sends app developers</strong></del></span>
<span class="inserted"><ins><em>the user is
- using that app, but that alone is often quite informative.</p>
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
+
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>machine's
“advertising ID,” so that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities</em></ins></span> in the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way
to</strong></del></span> <span class="inserted"><ins><em>app; others
only</em></ins></span> say
+ <span class="removed"><del><strong>“zero price” is
“gratis.”</p>
+
+ <p>The article takes for granted</strong></del></span> that the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is
+ <span class="inserted"><ins><em>using</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>app,
but</em></ins></span> that <span class="removed"><del><strong>snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ account.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <li id="M201810244">
- <p>Some Android apps</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some</em></ins></span> Android apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the <span class="removed"><del><strong>personal
details</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> of users that <span
class="removed"><del><strong>install the app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>have deleted them</a>.</p>
+ track</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>phones of users that have deleted
them</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some</strong></del></span>
- <li id="M201808030">
- <p>Some Google apps on Android <a
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps on</em></ins></span> Android <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span
class="removed"><del><strong>“consent” of</strong></del></span>
<span class="inserted"><ins><em>user's location even when</em></ins></span>
users <span class="removed"><del><strong>is not enough</strong></del></span>
<span class="inserted"><ins><em>disable “location
+ record the user's location even</em></ins></span> when <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>users disable “location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this
point,</strong></del></span> <span class="inserted"><ins><em>turn off the other
kinds of location
- tracking, but</em></ins></span> most users <span
class="removed"><del><strong>have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>will be
tricked by</em></ins></span> the <span
class="removed"><del><strong>“Terms and Conditions” that spell out
-what they are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>misleading
control.</p>
- </li>
-
- <li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements</em></ins></span> and <span
class="removed"><del><strong>honestly identify</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>information it collects on users, instead
-of hiding</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
-
- <p>This makes them act as spies for licensing enforcement.</p>
-
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>truly protect
people's privacy, we must prevent Google
-and other companies</strong></del></span> <span class="inserted"><ins><em>save
- a recording. But I can't be sure</em></ins></span> from <span
class="removed"><del><strong>getting this personal information
in</strong></del></span> the <span class="removed"><del><strong>first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
-
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More than</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>completely
stop</strong></del></span> <span class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>tracking. This is
- yet another example</strong></del></span> <span
class="inserted"><ins><em>apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
-
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p>
-
- </li>
-
- <li><p>More than 73%</strong></del></span> <span
class="inserted"><ins><em>get rid</em></ins></span> of the <span
class="removed"><del><strong>most popular</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both
proprietary</em></ins></span>
- Android <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>by</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their users with third
parties.</p>
- </li>
-
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="inserted"><ins><em>Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>app's
functionality,
- was</strong></del></span> <span class="inserted"><ins><em>proprietary apps
by getting apps from the free software
- only</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article</strong></del></span> <span
class="inserted"><ins><em>user if an app contains
anti-features</a>.</p>
- </li>
-
- <li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
- companies</a>.</p>
-
- <p>Grindr</em></ins></span> should not have <span
class="removed"><del><strong>described these apps as
- “free”—they are not free software. The clear way to say
- “zero price” is “gratis.”</p>
-
- <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>so much information about its users.
- It could be designed so</em></ins></span> that <span
class="removed"><del><strong>the usual analytics tools are
- legitimate,</strong></del></span> <span class="inserted"><ins><em>users
communicate such info to each
- other</em></ins></span> but <span class="removed"><del><strong>is that
valid? Software developers have no right</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to
- <span class="removed"><del><strong>analyze what</strong></del></span> <span
class="inserted"><ins><em>the server's database.</p>
- </li>
-
- <li id="M201803050">
- <p>The moviepass app and dis-service
- spy on</em></ins></span> users <span class="removed"><del><strong>are
doing or how. “Analytics” tools that snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
-
- <p>Don't be tracked—pay cash!</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software in popular</em></ins></span> Android apps <span
class="removed"><del><strong>(but not</strong></del></span>
- <span class="inserted"><ins><em>is pervasive and sometimes very clever.
Some trackers can</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect to 100</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
- </li>
-
- <li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></em></ins></span>
+ <p>There</em></ins></span> are <span
class="removed"><del><strong>sold.
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span> <span
class="inserted"><ins><em>other ways</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola phones modify</strong></del></span>
- <span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>Motorola</a>.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
- <li><p>Some manufacturers add a
- <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <span class="inserted"><ins><em><li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>snoopers</a>.</p>
-
- <p>Google did not intend</em></ins></span> to <span
class="removed"><del><strong>any file on the system.</p>
+ Samsung's back door</a> provides access to any file
on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>system.</p>
</li>
</ul>
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS:</strong></del></span> make <span
class="removed"><del><strong>sure to place new items on top under each
subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>these apps spy;</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1215,88 +1142,156 @@
</div>
<ul>
- <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong><a
+ <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em>microphone</a>.</p>
+
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>I expect</em></ins></span> it <span
class="removed"><del><strong><a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="removed"><del><strong>study how iOS cr...apps spy on
users</a>, because this
- would require circumventing</strong></del></span> <span
class="inserted"><ins><em>prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p>
+ illegal</strong></del></span> <span class="inserted"><ins><em>implements
DRM, too—that there is no way</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
+ would require circumventing</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p></em></ins></span>
</li>
- <li><p>In</strong></del></span> <span
class="inserted"><ins><em>snooping of these apps.</p>
+ <span
class="removed"><del><strong><li><p>In</strong></del></span>
- <p>On</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>other hand, Google
redistributes nonfree Android apps,</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span class="removed"><del><strong>latest iThings
system, “turning off” WiFi</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop</em></ins></span>
+ and <span class="removed"><del><strong>Bluetooth</strong></del></span>
<span class="inserted"><ins><em>collect information about its users</a>.
40% of</em></ins></span> the
<span class="removed"><del><strong>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
A more advanced way really does turn them off—only until 5am.
- That's Apple</strong></del></span> <span
class="inserted"><ins><em>responsibility</em></ins></span> for <span
class="removed"><del><strong>you—“We know you want to be spied
on”.</p>
- </li>
+ That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need</em></ins></span> to <span class="removed"><del><strong>be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>get
rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains
anti-features</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ —</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"></em></ins></span>
+ which <span class="removed"><del><strong>would mean no
way</strong></del></span> <span class="inserted"><ins><em>users are
HIV-positive, then provides the information</em></ins></span> to <span
class="removed"><del><strong>use it without having your fingerprints
+ taken. Users would</strong></del></span>
+ <span class="inserted"><ins><em>companies</a>.</p>
+
+ <p>Grindr should not</em></ins></span> have <span
class="removed"><del><strong>no way</strong></del></span> <span
class="inserted"><ins><em>so much information about its users.
+ It could be designed so that users communicate such info to each
+ other but not</em></ins></span> to <span class="removed"><del><strong>tell
whether</strong></del></span> the <span class="removed"><del><strong>phone is
snooping</strong></del></span> <span class="inserted"><ins><em>server's
database.</p>
+ </li>
- <p>Could Google</em></ins></span> have <span
class="inserted"><ins><em>done a better job of preventing apps from
- cheating? There is</em></ins></span> no <span
class="inserted"><ins><em>systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
- to <span class="removed"><del><strong>tell whether the phone is snooping on
- them.</p></li>
+ <li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span>
to <span class="removed"><del><strong>Apple's servers</a>. Big Brother
can
- get them from there.</p>
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected.
It</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p>
+ </li>
+
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers</em></ins></span> can
+ <span class="removed"><del><strong>get them from
there.</p></strong></del></span> <span class="inserted"><ins><em><a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></em></ins></span>
</li>
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>see what
they do.</p>
+ <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>server records these numbers</strong></del></span>
<span class="inserted"><ins><em>source code</em></ins></span> for <span
class="removed"><del><strong>at least 30
- days.</p>
+ <span class="inserted"><ins><em><li id="M201708270">
+ <p>The Sarahah</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all</em></ins></span> phone <span
class="removed"><del><strong>number</strong></del></span> <span
class="inserted"><ins><em>numbers and email addresses</a> in user's
address
+ book to developer's server. Note</em></ins></span> that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>user types into it</a>; the server records
these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p></em></ins></span>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span>
- the <span class="inserted"><ins><em>source</em></ins></span> code <span
class="removed"><del><strong>Apple
- sends</strong></del></span> <span
class="inserted"><ins><em>somehow</em></ins></span> to <span
class="removed"><del><strong>it.</p>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201707270">
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends to it.</p>
</li>
- <li><p>Around 47% of the most popular iOS apps
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
+
+ <p>On</em></ins></span> the <span class="removed"><del><strong>most
popular iOS apps
<a class="not-a-duplicate"
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of
their</strong></del></span> <span class="inserted"><ins><em>determine whether
they mistreat</em></ins></span> users <span class="removed"><del><strong>with
third parties.</p>
+ behavioral</strong></del></span> <span class="inserted"><ins><em>other
hand, Google redistributes nonfree Android apps,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of their <span
class="removed"><del><strong>users with third parties.</p>
</li>
- <li><p>iThings automatically upload to Apple's servers
all</strong></del></span> <span class="inserted"><ins><em>in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>photos and
+ <li><p>iThings automatically upload to Apple's servers all the
photos and
videos they make.</p>
<blockquote><p>
iCloud Photo Library stores every photo and video you take,
and keeps them up to date on all your devices.
- Any edits you make</strong></del></span> <span
class="inserted"><ins><em>app developers</em></ins></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
+ Any edits you make are automatically updated everywhere. [...]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>clever
- enough to outsmart</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ information</a></strong></del></span> <span
class="inserted"><ins><em>being
+ nonfree. It also distributes its own nonfree apps, such</em></ins></span>
as <span class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud
feature is</strong></del></span> <span class="inserted"><ins><em>Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by the
+ startup</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
“please don't ask where.”</p>
- <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>preventing apps from
+ cheating? There</em></ins></span> is <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
+ to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>inspect executable
proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If</em></ins></span> it <span
class="removed"><del><strong>still counts as</strong></del></span> <span
class="inserted"><ins><em>did</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google</em></ins></span> to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>protect us. We must demand
release</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> to <span
class="inserted"><ins><em>the
+ Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> to <span
class="inserted"><ins><em>the
public, so we can depend on each other.</p>
</li>
@@ -1335,43 +1330,42 @@
enabled</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access</em></ins></span> it
- <span class="removed"><del><strong>is still true</strong></del></span>
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in
<span class="removed"><del><strong>iOS 7.)</p></strong></del></span>
<span class="inserted"><ins><em>the
device</a>.</p></em></ins></span>
+ <span class="removed"><del><strong>is still true</strong></del></span>
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in
<span class="removed"><del><strong>iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>the device</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
<span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple</strong></del></span>
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for</em></ins></span> its <span
class="removed"><del><strong>geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
- along with the headphone's unique serial number.</p>
-
- <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>can be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>this was done without</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ distributing a spyware app</em></ins></span> for <span
class="inserted"><ins><em>its headphones</a>.
Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>state</a>.</p>
</li>
<li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>users' consent.
- If</em></ins></span> the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>fine print
of</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
- or</strong></del></span> <span class="inserted"><ins><em>app said that
users gave consent for this,
- would that make</em></ins></span> it <span class="removed"><del><strong>is
totally incompetent.</a></p>
+ Either Apple helps the NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>app would record</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
+ or it is totally incompetent.</a></p>
</li>
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
- the
- <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app to snoop at
all</a>.</p></em></ins></span>
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>the audio files users listen</em></ins></span> to
<span class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span>
+ <span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of</em></ins></span> the <span
class="inserted"><ins><em>app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1409,32 +1403,33 @@
<p>Currently,</em></ins></span> the <span
class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></li>
-
- <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to turn the
phones</strong></del></span>
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="inserted"><ins><em>only one phone</a>,</em></ins></span> and <span
class="removed"><del><strong>off, listen to</strong></del></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>user must
- explicitly opt-in before</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However, the app
- remains spyware—an “optional” piece of spyware is
+ being pre-installed on only one phone</a>, and the user must
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
+
+ <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber app tracks <a
-
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
<span class="inserted"><ins><em>ride</a>.</p>
+ <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to turn the phones
+ on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</em></ins></span> and <span
class="removed"><del><strong>off, listen to the microphone, retrieve
geo-location data from</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
- <p>This example illustrates how “getting the user's
+ <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>contact list. This
malware</strong></del></span> <span class="inserted"><ins><em>user's
consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>designed to
disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>inadequate as a protection against
massive surveillance.</p></em></ins></span>
@@ -1657,40 +1652,42 @@
scans your</strong></del></span>
<span class="inserted"><ins><em><li id="M201510300">
- <p>More than 73% and 47% of</em></ins></span> mobile <span
class="removed"><del><strong>phone's photo collections for known
faces</a>,</strong></del></span> <span
class="inserted"><ins><em>applications, from Android</em></ins></span> and
<span class="removed"><del><strong>suggests you to share the picture you take
according to who</strong></del></span> <span class="inserted"><ins><em>iOS
+ <p>More than 73% and 47% of</em></ins></span> mobile <span
class="removed"><del><strong>phone's photo collections for known
faces</a>,</strong></del></span> <span
class="inserted"><ins><em>applications, from Android</em></ins></span> and
<span class="removed"><del><strong>suggests you to share the picture you take
according to who
+ is in the frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers</strong></del></span> <span
class="inserted"><ins><em>iOS
respectively <a href="https://techscience.org/a/2015103001/">share
- personal, behavioral and location information</a> of their users with
- third parties.</p>
+ personal, behavioral</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>location information</a></em></ins></span> of
<span class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if the user didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>their
users with
+ third parties.</p></em></ins></span>
</li>
- <li id="M201508210">
- <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>in the
frame.</p>
+ <span
class="removed"><del><strong><li><p>Like</strong></del></span>
- <p>This spyware feature seems to require online
access</strong></del></span>
- <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
+ <span class="inserted"><ins><em><li id="M201508210">
+ <p>Like</em></ins></span> most “music screaming”
disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="inserted"><ins><em>increased snooping</a>, and</em></ins></span>
some
- <span class="removed"><del><strong>known-faces database, which means the
pictures</strong></del></span> are <span
class="removed"><del><strong>likely</strong></del></span> <span
class="inserted"><ins><em>starting</em></ins></span>
- to <span class="removed"><del><strong>be
- sent across</strong></del></span> <span
class="inserted"><ins><em>realize that it is nasty.</p>
-
- <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</em></ins></span> to
<span class="removed"><del><strong>Facebook's servers and face-recognition
- algorithms.</p>
+ demanded users submit to increased snooping</a>, and some are
starting
+ to realize that it is nasty.</p>
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>“serve”
+ <p>This article shows the <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></em></ins></span>
+ twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>attitude
of</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>proprietary software industry
+ typical example of the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
- <span
class="removed"><del><strong><li><p>Like</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506264">
+ <li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis proprietary
@@ -1698,34 +1695,24 @@
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but</em></ins></span> most <span
class="removed"><del><strong>“music screaming” disservices,
Spotify</strong></del></span> <span class="inserted"><ins><em>of them are not
in fact <a
+ “free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for that
word</em></ins></span>
- is <span class="removed"><del><strong>based on proprietary malware (DRM
and snooping). In August
- 2015 it</strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p>
+ ugly word “monetize”. A good replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
<li id="M201505060">
- <p>Gratis Android apps (but not</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on</em></ins></span> the
<span class="inserted"><ins><em>average.</p>
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
</li>
<li id="M201504060">
- <p>Widely used</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way
- to “serve” users better</a>—never mind
- whether they want that.</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>.</em></ins></span> This
is <span class="removed"><del><strong>a typical example
of</strong></del></span> <span class="inserted"><ins><em>in addition
to</em></ins></span>
- the <span class="removed"><del><strong>attitude</strong></del></span>
<span class="inserted"><ins><em>snooping done by the phone company, and perhaps
by the OS in
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
the phone.</p>
<p>Don't be distracted by the question</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
@@ -1775,13 +1762,12 @@
</li>
<li id="M201212100">
- <p>FTC</em></ins></span> says most mobile apps for children don't
respect privacy: <a
-
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <p>FTC</em></ins></span> says most mobile apps for children don't
respect privacy: <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -1791,9 +1777,8 @@
<ul class="blurbs">
<li id="M201307110">
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ <p>Skype contains <a
+
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
@@ -1825,12 +1810,15 @@
<li id="M201711070">
<p>The driver for a certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+ information to China</a>.</p></em></ins></span>
</li>
- <li id="M201512290">
- <p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201512290">
+ <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
video game consoles</em></ins></span> snoop on <span
class="inserted"><ins><em>their users and report to</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span>
<span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
@@ -1873,23 +1861,24 @@
to <span class="removed"><del><strong>the app developer but did not
ask about sending</strong></del></span> <span
class="inserted"><ins><em>spy through</em></ins></span> it <span
class="removed"><del><strong>to other companies. This shows the
weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any</strong></del></span> <span
class="inserted"><ins><em>too</a>. Here's</em></ins></span> information
<span class="removed"><del><strong>to anyone? A free software
flashlight</strong></del></span> <span class="inserted"><ins><em>on <a
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</em></ins></span> app <span
class="removed"><del><strong>would not.</p></strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p>
+ More about NSA app spying</a>.</p>
</li>
<li id="M200510200">
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
+ spies on every process running on</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p></em></ins></span>
+ have nothing</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>do with cheating.</p></em></ins></span>
</li>
</ul>
@@ -1913,16 +1902,42 @@
<ul class="blurbs">
<li id="M201708280"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>snoop on the people that use them</a>.</p>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major</strong></del></span> <span
class="inserted"><ins><em>bad</em></ins></span> security <span
class="removed"><del><strong>vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers to listen</strong></del></span> in <span
class="removed"><del><strong>on a child's speech, and even speak
+ into the toys themselves.</p>
+ </li>
- <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based
in</strong></del></span> <span class="inserted"><ins><em>sucker—reject
all</em></ins></span> the <span class="removed"><del><strong>U.S.</p>
+ <li>
+ <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop</em></ins></span> on <span class="removed"><del><strong>its users
through the proprietary control app</a>.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note</strong></del></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
+
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>use them</a>.</p>
- <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>article uses the term <a
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+
+ <p>It is unfortunate</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span
class="removed"><del><strong>data may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>data to</strong></del></span> <span
class="inserted"><ins><em>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
@@ -1933,97 +1948,54 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>joke: The other day</em></ins></span> a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>woman came up to me</em></ins></span> and <span
class="removed"><del><strong>even speak
- into the toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see
you</em></ins></span> on <span class="removed"><del><strong>its users
through</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
-don't know. You can't see out</em></ins></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
+<p>Emo Phillips made</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The
other day a woman came up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see</em></ins></span> out
+ <span class="removed"><del><strong>who</strong></del></span> the <span
class="removed"><del><strong>user was.</p>
- <p>The app</strong></del></span> <span
class="inserted"><ins><em>other way.” Evidently that</em></ins></span>
was <span class="removed"><del><strong>reporting</strong></del></span>
-<span class="inserted"><ins><em>before Amazon “smart”
TVs.</p>
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>other way.” Evidently that was
+before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own
words</em></ins></span> of the <span class="removed"><del><strong>vibrator
minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to him,
- is that</em></ins></span> it <span class="removed"><del><strong>was
surrounded by a person's
- body), as well as the vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>is
opt-in in newer models. But since</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>Vizio</em></ins></span> software <span
class="removed"><del><strong>which users could have
- checked</strong></del></span> <span class="inserted"><ins><em>is
- nonfree, we don't know what is actually happening behind the
scenes,</em></ins></span>
- and <span class="removed"><del><strong>changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>all future updates will leave</em></ins></span> the
<span class="removed"><del><strong>vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart
TV,</em></ins></span> for <span class="removed"><del><strong>collecting lots of
personal information about how
- people used it</a>.</p>
-
- <p>The company's statement</strong></del></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span>
- <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but</strong></del></span> <span class="inserted"><ins><em>easiest
way to make sure</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
<span class="inserted"><ins><em>isn't spying on you is
- to disconnect</em></ins></span> it <span class="removed"><del><strong>had
sold</strong></del></span> <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>data to</strong></del></span> <span
class="inserted"><ins><em>Internet, and use</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able to figure out
- who the user was.</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>terrestrial antenna
- instead. Unfortunately,</em></ins></span> this <span
class="removed"><del><strong>lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>get your own router (which can
- be an old computer running completely free software), and set
up</em></ins></span> a <span class="removed"><del><strong>total of
C$4m</a></strong></del></span>
- <span class="inserted"><ins><em>firewall</em></ins></span> to <span
class="removed"><del><strong>its customers.</p>
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>company has been ordered to pay a
total</strong></del></span> <span class="inserted"><ins><em>TV
sees,”</a> in the own words</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>the company's
+ CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>its customers.</p>
</li>
<li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>block connections</em></ins></span> to <span
class="removed"><del><strong>the
- manufacturer</a>. Guess what?</strong></del></span> <span
class="inserted"><ins><em>Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
- </li>
-
- <li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
-
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> the <span
class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span
class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
+ lower retail prices.</p>
- <p>That</strong></del></span> <span class="inserted"><ins><em>facts
it presents. It
- is too bad that</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the
<span class="removed"><del><strong>FBI could listen</strong></del></span>
- <span class="inserted"><ins><em>moral weakness of
surrendering</em></ins></span> to <span class="removed"><del><strong>these
conversations
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span class="inserted"><ins><em>make this
spying acceptable, according</em></ins></span> to <span
class="removed"><del><strong>access the data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>him,
+ is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span class="inserted"><ins><em>Vizio
software is
+ nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>scenes,</em></ins></span>
+ and <span class="inserted"><ins><em>there is no guarantee that all future
updates will leave</em></ins></span> the <span class="removed"><del><strong>FBI
could listen to these conversations
was unacceptable by itself.</p></li>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
+
+ <p>If you already own a Vizio smart TV (or any smart TV, for that
+ matter), the easiest way</em></ins></span> to <span
class="removed"><del><strong>spy on children and adults</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS:</strong></del></span> make sure <span
class="removed"><del><strong>to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <h3 id="SpywareOnSmartWatches">Spyware</strong></del></span> <span
class="inserted"><ins><em>it isn't spying</em></ins></span> on <span
class="removed"><del><strong>“Smart” Watches</h3>
<span class="anchor-reference-id">
(<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
</div>
@@ -2031,27 +2003,36 @@
<ul>
<li>
- <p>An LG</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702060">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>watch is designed</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs</em></ins></span>
- report <span class="removed"><del><strong>its location to someone else and
to transmit
+ <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>you</em></ins></span> is <span
class="removed"><del><strong>designed
+ <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
+ to <span class="removed"><del><strong>report its
location</strong></del></span> <span class="inserted"><ins><em>disconnect it
from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
+ if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>someone else</strong></del></span> <span
class="inserted"><ins><em>get your own router (which can
+ be an old computer running completely free software),</em></ins></span>
and <span class="inserted"><ins><em>set up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>transmit
conversations too</a>.</p>
</li>
<li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but</strong></del></span>
<span class="inserted"><ins><em>everything</em></ins></span> that <span
class="removed"><del><strong>could be a
- misunderstanding. However, it</strong></del></span> is <span
class="removed"><del><strong>certainly surveillance, at
+ <p>A very cheap “smart watch”
comes</strong></del></span> <span class="inserted"><ins><em>block connections
to Vizio's servers. Or, as a last resort,
+ you can replace your TV</em></ins></span> with <span
class="removed"><del><strong>an Android app</strong></del></span> <span
class="inserted"><ins><em>another model.</p>
+ </li>
+
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
+
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
+ <p>The</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> article <span
class="removed"><del><strong>says this is a back door, but that could be a
+ misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em>for the facts</em></ins></span> it <span
class="inserted"><ins><em>presents. It</em></ins></span>
+ is <span class="removed"><del><strong>certainly surveillance, at
least.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>viewed</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>too bad that the article finishes by advocating the
+ moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -2066,19 +2047,35 @@
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>them,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note that the specific sabotage method Lenovo used did</strong></del></span>
not <span class="removed"><del><strong>affect
+<li><p></strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
+ </li>
+
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</em></ins></span> that <span
class="removed"><del><strong>the specific sabotage method Lenovo used
did</strong></del></span> <span class="inserted"><ins><em>is viewed on them,
and</em></ins></span> not <span class="removed"><del><strong>affect
GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>just broadcasts and
- cable</a>. Even if the image</em></ins></span> is <span
class="removed"><del><strong>not really
+ cable</a>. Even if the image</em></ins></span> is <span
class="inserted"><ins><em>coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were</em></ins></span> not <span
class="removed"><del><strong>really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
+puts</strong></del></span> <span class="inserted"><ins><em>hidden as it
was</em></ins></span> in <span class="removed"><del><strong>its own
malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>these TVs,
+ does not legitimize the surveillance.</p>
+ </li>
+
+ <li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>be picked up by
proprietary malware running</em></ins></span>
+ on <span class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2088,20 +2085,33 @@
<ul>
<li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows</strong></del></span> <span class="inserted"><ins><em>other
devices in range so as to determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers can correlate ads with Web activity, and other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p>
+ </li>
+
+ <li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers in spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>user's own computer,
- the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>a way to disable the
- surveillance, even if</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Specifically, it</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers</em></ins></span>
can <span class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
+ across devices.</p>
+
+ <p>It is possible to turn</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>off, but having</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>enabled by default
+ is an injustice already.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -2110,115 +2120,134 @@
</div>
<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>were not hidden as it was</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these TVs,
- does not legitimize the surveillance.</p></em></ins></span>
+ Microsoft changed Skype</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers are unaware they're
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareOnTheRoad -->
<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511130">
- <p>Some web and TV advertisements play inaudible
- sounds</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users</em></ins></span> to <span
class="removed"><del><strong>place</strong></del></span> new <span
class="removed"><del><strong>items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>be picked up by proprietary malware
running</em></ins></span>
- on <span class="removed"><del><strong>The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>other devices</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
<ul>
<li>
- <p>Every “home security” camera, if its
manufacturer</strong></del></span> <span class="inserted"><ins><em>range so as
to determine that they
- are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>communicate</strong></del></span> <span
class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="removed"><del><strong>it,
- is</strong></del></span> <span class="inserted"><ins><em>Web activity,
and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
+ <p>Every “home security” camera,</strong></del></span>
<span class="inserted"><ins><em>combined surveillance by default.</p>
</li>
- <li id="M201511060">
- <p>Vizio goes</em></ins></span> a <span
class="removed"><del><strong>surveillance device.</strong></del></span> <span
class="inserted"><ins><em>step further than other TV
- manufacturers in spying on their users: their</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
+ <li id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even</em></ins></span> if <span
class="removed"><del><strong>its manufacturer can communicate with it,
+ is</strong></del></span> <span class="inserted"><ins><em>it
isn't</em></ins></span> a <span class="removed"><del><strong>surveillance
device.</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
+ </li>
- <p>It</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
- <p>The article describes wrongdoing</strong></del></span> <span
class="inserted"><ins><em>possible to turn this off, but having it
enabled</em></ins></span> by <span class="inserted"><ins><em>default
- is an injustice already.</p>
+ <li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by the manufacturer,
based</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops</em></ins></span> on <span class="removed"><del><strong>the fact
+ that the device is tethered</strong></del></span> <span
class="inserted"><ins><em>what programs people watch, and even what they
wanted</em></ins></span> to
+ <span class="inserted"><ins><em>record</a>.</p>
</li>
- <li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span class="removed"><del><strong>manufacturer,
based on the fact
- that</strong></del></span> <span class="inserted"><ins><em>600 millions
social media profiles</em></ins></span> the <span
class="removed"><del><strong>device is tethered</strong></del></span> <span
class="inserted"><ins><em>company
- already monitors. Tivo customers are unaware they're
- being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span class="removed"><del><strong>a
server.</p>
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used</em></ins></span> a <span
class="removed"><del><strong>server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that the device gives the
company</strong></del></span> <span class="inserted"><ins><em>new
combined</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
+ <p>But it also demonstrates</strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” to make its TVs snoop
on what
+ users watch</a>. The TVs did not do</em></ins></span> that <span
class="removed"><del><strong>the device gives the company
+ surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>when first sold.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>The Nest Cam</strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
+ <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is</strong></del></span> <span
class="inserted"><ins><em>Samsung “Smart” TV</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
+ Nuance can save</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to</em></ins></span>
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>US or some
+ other government.</p>
- <span class="inserted"><ins><em><li id="M201507240">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs recognize and</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are</em></ins></span> watching</a>, even <span
class="removed"><del><strong>when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is
using</strong></del></span> <span
class="inserted"><ins><em>if</em></ins></span> it <span
class="removed"><del><strong>to outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>isn't a TV channel.</p></em></ins></span>
+ <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>using it</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
<span class="inserted"><ins><em>be trusted unless it is done by free
+ software</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul>
<li><p>E-books can contain JavaScript code,
- and</strong></del></span>
+ and</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"></em></ins></span>
- snoops on <span class="removed"><del><strong>readers</a>.</p>
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to third
+ parties</a>.</p></em></ins></span>
</li>
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report</strong></del></span> <span class="inserted"><ins><em>what
programs people watch, and</em></ins></span> even <span
class="removed"><del><strong>which page the user reads at</strong></del></span>
what <span class="removed"><del><strong>time</a>.</p>
+ <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
+ Kindle:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201411090">
+ <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all</em></ins></span> the <span class="removed"><del><strong>user
reads at what</strong></del></span> time</a>.</p>
</li>
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>they
wanted</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409290">
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ better.</p>
+
+ <p>This shows that laws requiring products</em></ins></span> to
<span class="removed"><del><strong>Adobe</a>. Adobe's
“excuse”: it's
+ needed</strong></del></span> <span class="inserted"><ins><em>get users'
formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
</li>
</ul>
@@ -2228,315 +2257,273 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
+<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>tracking, the TV
will not
+ work.”</p>
+
+ <p>Proper laws would say that TVs</em></ins></span> are
+ <span class="removed"><del><strong><a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>not allowed to report what the
+ user watches—no exceptions!</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
- users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>first sold.</p>
- </li>
-
- <li id="M201502090">
- <p>The Samsung “Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in the car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span class="inserted"><ins><em>and would then
have to give</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>US or some
- other government.</p>
-
- <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time;</strong></del></span> <span class="inserted"><ins><em>be trusted
unless</em></ins></span> it is <span class="removed"><del><strong>possible to
physically remove the cell phone modem
- though.</p>
- </li>
-
- <li id="records-drivers"><p>Proprietary</strong></del></span>
<span class="inserted"><ins><em>done by free</em></ins></span>
- software in <span class="removed"><del><strong>cars</strong></del></span>
<span class="inserted"><ins><em>your own computer.</p>
+ <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system</strong></del></span> <span
class="inserted"><ins><em>switch to turn this off</em></ins></span> has
+ no <span class="removed"><del><strong>authentication when
+ accessed through the modem. However, even if it asked for
+ authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>effect</a>. (The fact</em></ins></span> that
<span class="removed"><del><strong>Nissan has no
+ access. The software in</strong></del></span> the <span
class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>transmission reports a 404 error
+ really</em></ins></span> means <span class="removed"><del><strong>it
demands blind faith from its users</a>.</p>
- <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive</em></ins></span> information <span
class="removed"><del><strong>about drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>will be transmitted</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p></strong></del></span> <span
class="inserted"><ins><em>third
- parties</a>.</p>
- </li>
-
- <li id="M201411090"></em></ins></span>
- <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article,</strong></del></span> <span
class="inserted"><ins><em>Amazon “Smart” TV</em></ins></span> is
<span class="removed"><del><strong>not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
- </li>
-
- <li id="M201409290">
- <p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables the phone company to track</strong></del></span> <span
class="inserted"><ins><em>nothing;</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>server could save that data anyway.)</p>
- <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
- payment systems,</strong></del></span> <span
class="inserted"><ins><em>2014,</em></ins></span> but <span
class="removed"><del><strong>the invasion isn't done by malware. The other
- cases mentioned</strong></del></span> <span class="inserted"><ins><em>we
don't expect this has got
- better.</p>
-
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>TV will not
- work.”</p>
-
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the <span class="removed"><del><strong>car's location at
any time. (See</strong></del></span>
- <span class="inserted"><ins><em>user watches—no exceptions!</p>
- </li>
-
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information, but if</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>user watches, and the switch</em></ins></span> to
<span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data
- <span class="removed"><del><strong>and hand</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
-
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
+ snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
+ <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span> <span
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212170">
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>a
“smart” TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span class="inserted"><ins><em>break
security on</em></ins></span> a <span class="removed"><del><strong>matter of
proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a></em></ins></span>
+ and <span class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>use its camera to watch</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned</strong></del></span> <span
class="inserted"><ins><em>people who</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware in the
car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>watching TV.</p>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-<ul>
- <li><p>Lots of “smart” products are
- designed</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture</em></ins></span> to <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>video they capture</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a>, which save it
long-term.</p>
- <p>In many cases, the video shows</em></ins></span> everyone <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>that comes near, or merely
- passes by,</em></ins></span> the <span
class="removed"><del><strong>house,</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>car's location</strong></del></span> <span
class="inserted"><ins><em>video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look
- at the videos freely. It appears Amazon has tried to prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
+ <p>The article focuses on how Ring used to let individual employees
look</em></ins></span>
+ at <span class="removed"><del><strong>any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information,</strong></del></span> <span
class="inserted"><ins><em>the videos freely. It appears Amazon has tried to
prevent that
+ secondary abuse,</em></ins></span> but <span
class="removed"><del><strong>if</strong></del></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly</em></ins></span> all <span
class="inserted"><ins><em>“home security cameras” <a
+ <p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
-
- <p>Today's technological practice does not include any
way</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy</em></ins></span> of
- <span class="removed"><del><strong>making</strong></del></span> <span
class="inserted"><ins><em>everything they
- see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>device that can obey
your voice commands without
- potentially spying on you. Even if it is
air-gapped,</strong></del></span> <span class="inserted"><ins><em>better
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>could be
- saving up records about you</strong></del></span> <span
class="inserted"><ins><em>suggested that these
- manufacturers promise not to look at what's in the videos. That's not
- security</em></ins></span> for <span class="removed"><del><strong>later
examination.</p></strong></del></span> <span
class="inserted"><ins><em>your home. Security means making sure they don't get
to
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="inserted"><ins><em>suggested that these
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in the videos. That's not
+ security for your home. Security means making sure they
don't</em></ins></span> get <span class="inserted"><ins><em>to
see through your camera.</p>
</li>
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Nest thermometers
- send</strong></del></span>
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span class="removed"><del><strong>data
+ and hand</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
- <span class="inserted"><ins><em><li id="M201511250">
- <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p>
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it
+ to outsmart you.</p></em></ins></span>
</li>
+</ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
- to <span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
- </li>
-</ul>
+<span class="removed"><del><strong><!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+<ul>
+ <li><p>Lots of “smart” products are
+ designed</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span>
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>product as shipped
doesn't act as</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to
- <span class="removed"><del><strong>disable</strong></del></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>code could surely
convert</em></ins></span> it
- <span class="inserted"><ins><em>into one.</p>
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes</em></ins></span> to <span
class="removed"><del><strong>everyone in</strong></del></span> the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
+ into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>found to make <a
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ recordings of the conversation between two users</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on <span class="removed"><del><strong>their
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its users through the proprietary control
app</a>.</p></em></ins></span>
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
- <p>The <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> was <span
class="removed"><del><strong>as</strong></del></span> <span
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
-
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>the vibrator minute by
+ <p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
+ <p>Note</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+
+ <p>Today's technological practice does not include any way of
+ making</strong></del></span> <span class="inserted"><ins><em>totally
inadequate proposed response:</em></ins></span> a <span
class="removed"><del><strong>device that can obey your voice commands without
+ potentially spying on you. Even if it is air-gapped, it could be
+ saving up records</strong></del></span> <span
class="inserted"><ins><em>labeling
+ standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>you for later examination.</p>
+ </li>
+
+ <li><p>Nest thermometers
+ send</strong></del></span> <span class="inserted"><ins><em>their
products, rather than free software which users could have checked
and changed.</p>
- <p>The company</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
- consent before</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for</em></ins></span> collecting <span
class="inserted"><ins><em>lots of</em></ins></span> personal <span
class="inserted"><ins><em>information about how people
+ <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>personal information</em></ins></span> about <span
class="inserted"><ins><em>how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing
the</em></ins></span> data <span class="removed"><del><strong>are totally
inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>may be
- true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>TV will
- not work.”</p>
+ <p>The company's statement that it was anonymizing</em></ins></span>
the <span class="removed"><del><strong>user</a>.</p>
+ </li>
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
- user <span class="removed"><del><strong>watches — no
exceptions!</p>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="removed"><del><strong>spy on their
renters</a>.</p>
</li>
- <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+</ul>
+
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day</strong></del></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>data
+ broker, the data broker would have been able</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see</strong></del></span> <span
class="inserted"><ins><em>figure</em></ins></span> out <span
class="inserted"><ins><em>who</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
+
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the <span class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>company has
been ordered to pay a total</em></ins></span> of <span
class="inserted"><ins><em>C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
- manufacturer's snooping.</p>
+ Crackers found</em></ins></span> a way to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>surveillance.</p></strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>these
- conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p></em></ins></span>
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by itself.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
+ <span class="removed"><del><strong><li><p>More or less
all</strong></del></span>
<span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
+ <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="removed"><del><strong>get
users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>speech
recognition
+ company based in</em></ins></span> the <span
class="removed"><del><strong>TV
+ will say, “Without your consent to tracking,</strong></del></span>
<span class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>toys</em></ins></span> with <span
class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This</em></ins></span>
would <span class="removed"><del><strong>say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>report
what
+ the user watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further than other TV
manufacturers</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> on
+ <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>a child's speech,
and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ going to spy on children</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
</li>
</ul>
@@ -2549,13 +2536,13 @@
<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>people, DJI is</em></ins></span> in
- <span class="removed"><del><strong>range so</strong></del></span> <span
class="inserted"><ins><em>many cases <a
+ to <span class="removed"><del><strong>turn this off, but having it enabled
by default</strong></del></span> <span class="inserted"><ins><em>snoop on other
people, DJI</em></ins></span> is <span class="removed"><del><strong>an
injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>in many cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ on you</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2563,6 +2550,28 @@
</div>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates</em></ins></span> with <span
class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>HP
servers</a></em></ins></span> to <span class="inserted"><ins><em>make
sure</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles</strong></del></span> <span
class="inserted"><ins><em>user is still
+ paying for</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>subscription,</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible sounds
to</strong></del></span> <span class="inserted"><ins><em>hasn't printed more
pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may</em></ins></span> be
+ <span class="removed"><del><strong>picked up by proprietary malware
running</strong></del></span> <span class="inserted"><ins><em>cheaper in some
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions</em></ins></span> in
+ <span class="removed"><del><strong>range so</strong></del></span> <span
class="inserted"><ins><em>the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -3246,7 +3255,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/25 10:31:07 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- proprietary-surveillance.de.po 24 Feb 2019 14:00:05 -0000 1.263
+++ proprietary-surveillance.de.po 28 Feb 2019 09:00:39 -0000 1.264
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -3833,6 +3833,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.382
retrieving revision 1.383
diff -u -b -r1.382 -r1.383
--- proprietary-surveillance.fr.po 25 Feb 2019 12:05:44 -0000 1.382
+++ proprietary-surveillance.fr.po 28 Feb 2019 09:00:39 -0000 1.383
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-02-25 13:03+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3199,6 +3200,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-surveillance.it-diff.html 25 Feb 2019 10:31:07 -0000
1.115
+++ proprietary-surveillance.it-diff.html 28 Feb 2019 09:00:39 -0000
1.116
@@ -485,7 +485,7 @@
</li>
<span class="removed"><del><strong><li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search
terms</strong></del></span>
+ Spotlight search</a> sends users' search</strong></del></span>
<span class="inserted"><ins><em><li id="M201410200">
<p>Various operations in <a
@@ -496,7 +496,7 @@
<li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms</em></ins></span> to
Apple.</p>
+ Spotlight search</a> sends users' search</em></ins></span> terms to
Apple.</p>
</li>
</ul>
@@ -519,8 +519,9 @@
<p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p>
+ BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of</strong></del></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as “free”,
but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
@@ -603,36 +604,22 @@
the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>spell out
what they</strong></del></span> <span class="inserted"><ins><em>we know nearly
all portable
phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em><a
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal
information</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>phones'
radio software</a>.</p></em></ins></span>
+ lots of bugs in</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
+ <li id="M201307000">
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>users, instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>remote
command, and users cannot stop
+ them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
- <span class="inserted"><ins><em><li id="M201307000">
- <p>Portable phones with GPS</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
-
- <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
- disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
- <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p></em></ins></span>
+<p>However,</strong></del></span> <span class="inserted"><ins><em>will
eventually require all new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
</li>
-
- <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -642,35 +629,56 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>most popular Android apps
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>other companies from getting</strong></del></span>
<span class="inserted"><ins><em>the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>,
because</em></ins></span>
+ this <span class="removed"><del><strong>personal information
in</strong></del></span> <span class="inserted"><ins><em>would require
circumventing</em></ins></span> the <span class="removed"><del><strong>first
+place!</p></strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>latest iThings system,
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>location tracking,</strong></del></span> <span
class="inserted"><ins><em>Bluetooth the obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced way really does
turn
+ them off—only until 5am. That's Apple for you—“We
+ know</em></ins></span> you <span class="removed"><del><strong>must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>want</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing
would</strong></del></span> be <span class="removed"><del><strong>almost
+ unthinkable with free software.</p>
+
+ </li>
+
+ <li><p>More than 73% of the most popular Android apps
<a href="http://jots.pub/a/2015103001/index.php">share personal,
behavioral and location information</a> of their users with third
parties.</p>
</li>
<li><p>“Cryptic communication,” unrelated to the
app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>say
+ “free”—they are not free software. The clear way to say
“zero price” is “gratis.”</p>
- <p>The article takes for granted that</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ <p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
+ just as wrong as any other snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on the average.</p>
</li>
<li><p>Spyware is present in some Android devices when they are
sold.
Some Motorola phones modify Android to
@@ -678,16 +686,13 @@
send personal data to Motorola</a>.</p>
</li>
- <li><p>Some manufacturers add a</strong></del></span> <span
class="inserted"><ins><em>obvious way</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span class="removed"><del><strong>any
file on the system.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span class="inserted"><ins><em>spied
on”.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -746,10 +751,10 @@
behavioral and location information</a> of their users with third
parties.</p>
</li>
- <li><p>iThings automatically upload to Apple's servers
all</strong></del></span>
+ <li><p>iThings</strong></del></span>
<span class="inserted"><ins><em><li id="M201509240">
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the photos
+ <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -1423,100 +1428,35 @@
<li><p>
<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that,</em></ins></span> and
<span class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>deleted these apps
after
+Note that the specific sabotage method Lenovo</strong></del></span> <span
class="inserted"><ins><em>deleted these apps after
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</em></ins></span> in <span class="inserted"><ins><em>the
responsibility for the injustice of their being
- nonfree. It also distributes</em></ins></span> its own <span
class="removed"><del><strong>malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>nonfree
apps, such as Google Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect the emails of
members</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>preventing apps from
+ <p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what</em></ins></span> they
<span class="removed"><del><strong>pass it through
Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span
class="inserted"><ins><em>do.</p>
-
- <p>Google could demand the source code</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
+ to inspect executable proprietary apps to see what they do.</p>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>these apps, and study
- the source code somehow</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> each <span
class="removed"><del><strong>subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>other.</p>
+ public, so we can depend on each other.</p>
</li>
<li id="M201705230">
<p>Apps for BART <a
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop</em></ins></span> on <span class="removed"><del><strong>The
Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
+ snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
@@ -2018,9 +1958,10 @@
<li id="M201504300">
<p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
+ used <span class="inserted"><ins><em>a firmware “upgrade” to
make its TVs snoop on what
+ users watch</a>. The TVs</em></ins></span> did not <span
class="removed"><del><strong>affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>do that
when first sold.</p>
</li>
<li id="M201502090">
@@ -2055,26 +1996,91 @@
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
- work.”</p>
-
- <p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p>
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install
is</strong></del></span> <span class="inserted"><ins><em>user declines consent?
Probably the TV will
+ say, “Without your consent to tracking, the TV
will</em></ins></span> not <span class="removed"><del><strong>really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span class="inserted"><ins><em>work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405200">
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>other devices</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>LG later said it had installed a patch to stop this, but any
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>user's local network</a>.</p>
+
+ <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A</strong></del></span> <span class="inserted"><ins><em>had
installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
@@ -2085,11 +2091,8 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a</em></ins></span>
“smart” <span class="inserted"><ins><em>TV</a>
- and use its</em></ins></span> camera <span class="removed"><del><strong>is
<a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using
it</strong></del></span> to <span class="removed"><del><strong>outsmart
+ Crackers found a way to break security on a</em></ins></span>
“smart” <span class="removed"><del><strong>device means the
manufacturer is using it</strong></del></span> <span
class="inserted"><ins><em>TV</a>
+ and use its camera</em></ins></span> to <span
class="removed"><del><strong>outsmart
you.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
@@ -2123,27 +2126,13 @@
passes by,</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
<p>The article focuses on how Ring</em></ins></span> used
- <span class="removed"><del><strong>by most US
libraries,</strong></del></span> <span class="inserted"><ins><em>to let
individual employees look
- at the videos freely. It appears Amazon has tried to prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender to.</p>
- </li>
-
- <li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>everything they
- see</a>. “Home insecurity camera” would be a better
- name!</p>
-
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>look at
what's in the videos. That's not
- security for your home. Security means making sure they don't
get</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span>
- <span class="inserted"><ins><em>see through your
camera.</p></em></ins></span>
+ <span class="removed"><del><strong>by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>let
individual employees look
+ at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>check DRM!</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
@@ -2151,35 +2140,52 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
</li>
<li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201511250">
- <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no
authentication</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
the <span class="removed"><del><strong>modem. However, even
if</strong></del></span> <span class="inserted"><ins><em>“owner”
switches</em></ins></span> it <span class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
-
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span
class="inserted"><ins><em>using</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+ <p>That's easy to do because the system has no authentication when
+ accessed through</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>modem.
However, even if it asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera”
would</em></ins></span> be <span
class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>these
+ manufacturers promise not to look at what's</em></ins></span> in the <span
class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
+ security for your home. Security</em></ins></span> means <span
class="removed"><del><strong>it demands blind faith from its
users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>making sure they don't get</em></ins></span> to
+ <span class="inserted"><ins><em>see through your camera.</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
- <p>Even if no one connects</strong></del></span>
- to <span class="inserted"><ins><em>outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
</li>
</ul>
@@ -2193,9 +2199,8 @@
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
- listening device, remote changes</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span>
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span>
<span class="inserted"><ins><em>into one.</p>
</li>
@@ -2207,131 +2212,118 @@
</li>
<li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter of</strong></del></span>
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>control app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p>
- <p>The app was reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> the <span
class="removed"><del><strong>invasion isn't done</strong></del></span> <span
class="inserted"><ins><em>vibrator minute</em></ins></span> by <span
class="removed"><del><strong>malware. The other
- cases mentioned are done</strong></del></span>
- <span class="inserted"><ins><em>minute (thus, indirectly, whether it was
surrounded</em></ins></span> by <span class="removed"><del><strong>proprietary
malware in</strong></del></span> <span class="inserted"><ins><em>a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>vibration frequency.</p>
-
- <p>Note</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>totally
inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
- products, rather than free software which users could have
checked</em></ins></span>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>drivers'
movements</a>,</strong></del></span> <span class="inserted"><ins><em>their
+ products, rather than free software</em></ins></span> which <span
class="removed"><del><strong>is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>users could
have checked</em></ins></span>
and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>changed.</p>
+ <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p></em></ins></span>
- <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company
says</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
+ <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article, is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>privacy, and should</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>data may be
- true, but</em></ins></span> it <span class="removed"><del><strong>to
get</strong></del></span> <span class="inserted"><ins><em>doesn't really
matter. If it had sold</em></ins></span> the data
- <span class="removed"><del><strong>and hand it
over,</strong></del></span> <span class="inserted"><ins><em>to a data
- broker,</em></ins></span> the <span class="removed"><del><strong>state can
store it.</p>
- </li>
-</ul>
-
+ <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems,</strong></del></span>
+ <span class="inserted"><ins><em>true,</em></ins></span> but <span
class="inserted"><ins><em>it doesn't really matter. If it had
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>data to a data
+ broker,</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest thermometers
- send</strong></del></span> <span class="inserted"><ins><em>figure out who the
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>user</a>.</p>
- </li>
-
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>company has been ordered</em></ins></span> to <span
class="removed"><del><strong>spy on their renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>pay</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the company <span class="inserted"><ins><em>has been ordered to pay a
total of C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
<p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>access the data</a> collected by the
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently
that</strong></del></span> <span class="inserted"><ins><em>FBI could listen to
these
- conversations</em></ins></span> was
-<span class="removed"><del><strong>before Amazon “smart”
TVs.</p>
-
-<ul>
- <li>
- <p>Vizio</strong></del></span> <span
class="inserted"><ins><em>unacceptable by itself.</p>
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The</em></ins></span> “smart” <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>store it.</p>
</li>
+</ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
- <li id="M201502180">
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy</em></ins></span> on <span class="removed"><del><strong>them,
and not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>children</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if the
image</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI</em></ins></span> is <span
class="removed"><del><strong>coming from the user's own
- computer, the TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
</ul>
@@ -2342,8 +2334,24 @@
</div>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
+ and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>constantly
+ communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>coming from</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for</em></ins></span> the <span class="removed"><del><strong>user's
own
+ computer,</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
+ specific cases,</em></ins></span> it <span
class="removed"><del><strong>is. The existence</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+ restrictions in the use</em></ins></span> of a <span
class="inserted"><ins><em>printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201808120">
- <p>Crackers found</em></ins></span> a way to
+ <p>Crackers found a</em></ins></span> way to
<span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as it was in
these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
</li>
@@ -3011,7 +3019,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/25 10:31:07 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary-surveillance.it.po 24 Feb 2019 14:00:05 -0000 1.276
+++ proprietary-surveillance.it.po 28 Feb 2019 09:00:39 -0000 1.277
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3620,6 +3620,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary-surveillance.ja-diff.html 25 Feb 2019 10:31:07 -0000
1.125
+++ proprietary-surveillance.ja-diff.html 28 Feb 2019 09:00:39 -0000
1.126
@@ -1244,7 +1244,17 @@
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>save
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>save
a recording. But I can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
@@ -1252,39 +1262,76 @@
</li>
<li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span
class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop
+ and collect information about its users</a>. 40%</em></ins></span>
of <span class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>the apps were
found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
+ detect only some methods</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>snooping, in these proprietary apps whose
+ source code</em></ins></span> they <span class="removed"><del><strong>pass
it through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>cannot look at. The other apps might be
snooping</em></ins></span>
+ in <span class="removed"><del><strong>Cisco TNP IP
phones:</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ only</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
+ the user if an app contains
anti-features</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201804020">
+ <span class="inserted"><ins><em><li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
- other but not to the server's database.</p>
+ It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span>
+ <span class="inserted"><ins><em>other but not to the server's
database.</p>
</li>
<li id="M201803050">
<p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
+ spy</em></ins></span> on <span class="removed"><del><strong>The
Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
@@ -1292,7 +1339,13 @@
</li>
<li id="M201711240">
- <p>Tracking software in popular Android apps
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
@@ -1787,7 +1840,7 @@
</li>
<li id="M201702060">
- <p>Vizio “smart” <a
+ <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
@@ -1845,32 +1898,18 @@
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs
snoop</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>what
+ used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
- <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the</em></ins></span>
US <span class="removed"><del><strong>Companies, NSA To Route Around Domestic
Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>or some
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless</em></ins></span>
it <span class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>is done by free
+ <p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
@@ -1880,9 +1919,12 @@
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span
class="removed"><del><strong>emails of members</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ <p>The Amazon “Smart” TV</em></ins></span> is <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
</li>
<li id="M201409290">
@@ -1890,7 +1932,7 @@
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>Parliament</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect</em></ins></span> this
<span class="removed"><del><strong>way, because they pass</strong></del></span>
<span class="inserted"><ins><em>has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
<p>This shows that laws requiring products to get users' formal
@@ -1914,184 +1956,147 @@
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way to break security on a</em></ins></span>
“smart” <span class="removed"><del><strong>device means the
manufacturer is using it</strong></del></span> <span
class="inserted"><ins><em>TV</a>
+ and use its camera</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ send</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>video</em></ins></span> they <span
class="removed"><del><strong>report even</strong></del></span> <span
class="inserted"><ins><em>capture to Amazon
servers</a>,</em></ins></span> which <span
class="removed"><del><strong>page</strong></del></span> <span
class="inserted"><ins><em>save it
long-term.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>video
shows everyone that comes near, or merely
+ passes by,</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look
+ <p>The article focuses on how Ring</em></ins></span> used
+ <span class="removed"><del><strong>by most US
libraries,</strong></del></span> <span class="inserted"><ins><em>to let
individual employees look
at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
+ give the manufacturer an unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
- security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>look at
what's in the videos. That's not
+ security for your home. Security means making sure they don't
get</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span>
+ <span class="inserted"><ins><em>see through your
camera.</p></em></ins></span>
</li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
<ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
- </li>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
- <li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ <span class="inserted"><ins><em><li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
</li>
- <li id="M201511250"></em></ins></span>
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it “off.”</p>
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ effectively</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow</em></ins></span> anyone <span
class="removed"><del><strong><a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
- <p>A “smart” device means the manufacturer is using
<span class="removed"><del><strong>it to outsmart
- you.</p>
+ <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because the system has no authentication when
+ accessed</strong></del></span> <span
class="inserted"><ins><em>watch</em></ins></span> through <span
class="removed"><del><strong>the modem. However,</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,</em></ins></span>
+ even <span class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>when the “owner”
switches</em></ins></span> it <span class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> is
+ <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span
class="inserted"><ins><em>using</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span>
- to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
+ <p>Even if no one connects</strong></del></span>
+ to <span class="inserted"><ins><em>outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because the system has no authentication when
- accessed through</strong></del></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>code could surely convert</em></ins></span> it
<span class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span>
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span>
<span class="inserted"><ins><em>into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make <a
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span class="removed"><del><strong>car
is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</em></ins></span> its <span
class="removed"><del><strong>users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>users
through</em></ins></span> the <span class="removed"><del><strong>phone company
to track</strong></del></span> <span class="inserted"><ins><em>proprietary
control app</a>.</p>
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
- <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>temperature of</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>was surrounded by
a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201703140">
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
- <li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span> <span class="inserted"><ins><em>vibration
frequency.</p>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>drivers'
movements</a>,</strong></del></span> <span class="inserted"><ins><em>their
@@ -2099,161 +2104,178 @@
and
<span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p></em></ins></span>
- <p>The <span class="removed"><del><strong>case</strong></del></span>
<span class="inserted"><ins><em>company that made the vibrator <a
+ <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article, is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned
in</strong></del></span> <span class="inserted"><ins><em>personal information
about how people
+ was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>privacy, and should</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
+ <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems,</strong></del></span>
+ <span class="inserted"><ins><em>true,</em></ins></span> but <span
class="inserted"><ins><em>it doesn't really matter. If it had
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>data to a data
+ broker,</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out who the
user was.</p>
- <p>Following</em></ins></span> this <span
class="removed"><del><strong>article, is not
- really</strong></del></span> <span class="inserted"><ins><em>lawsuit,
<a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>total</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m</a>
to its
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the company <span class="inserted"><ins><em>has been ordered to pay a
total of C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>microphones <a
+ <p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a>
collected</em></ins></span> by <span class="removed"><del><strong>proprietary
malware in</strong></del></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
-
- <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
+
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
- company <span class="removed"><del><strong>says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>store it.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
- </li>
-</ul></em></ins></span>
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>a child's speech, and even speak into the
+ toys themselves.</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ <li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201808120">
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me and
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>break the security of
an Amazon device,
- and</em></ins></span> <a <span class="removed"><del><strong>href="
+ <li><p>More or less all “smart” TVs <a href="
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a> for them.</p>
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</strong></del></span>
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
- easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708040">
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>tracking, the TV will
not work.”</p>
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
-
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
+</ul>
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
+
+<div class="big-subsection">
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the user <span
class="removed"><del><strong>watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further</strong></del></span> <span
class="inserted"><ins><em>is still
+ paying for the subscription, and hasn't printed more
pages</em></ins></span> than <span class="removed"><del><strong>other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>some
+ specific cases, it spies</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
+ restrictions in the use of a printer</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>snoops on its
user</em></ins></span> by <span class="removed"><del><strong>default
- is an injustice already.</p>
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>would otherwise be in
+ working order.</p>
</li>
- <li><p>Tivo's alliance with Viacom adds 2.3 million households to
- the 600 millions social media profiles</strong></del></span>
- <span class="inserted"><ins><em>sending usage data back
over</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ <li id="M201808120">
+ <p>Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>break the security of an Amazon device,
+ and <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"></em></ins></span>
+ turn <span class="removed"><del><strong>this off, but
having</strong></del></span> it <span class="removed"><del><strong>enabled by
default
+ is an injustice already.</p>
</li>
- <li id="M201706204">
- <p>Lots of “smart” products</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>into a
listening device</a> for them.</p>
+
+ <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles</strong></del></span> <span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
+
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
advertisement with online purchases</a>, exposing all users to
new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible sounds to be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span>
- <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.</p>
+ </li>
+
+ <li id="M201804140">
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>its
user by
+ sending usage data back over the Internet</a>.</p>
+ </li>
+
+ <li id="M201706204">
+ <p>Lots of “smart” products are designed <a
+
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
listen</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>everyone in the house, all the
time</a>.</p>
<p>Today's technological practice does not include any way of making
@@ -2823,7 +2845,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/25 10:31:07 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.249
retrieving revision 1.250
diff -u -b -r1.249 -r1.250
--- proprietary-surveillance.ja.po 24 Feb 2019 14:00:05 -0000 1.249
+++ proprietary-surveillance.ja.po 28 Feb 2019 09:00:39 -0000 1.250
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3046,6 +3046,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary-surveillance.pot 24 Feb 2019 14:00:05 -0000 1.197
+++ proprietary-surveillance.pot 28 Feb 2019 09:00:39 -0000 1.198
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2193,6 +2193,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a "
"href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it "
"into a listening device</a> for them."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.477
retrieving revision 1.478
diff -u -b -r1.477 -r1.478
--- proprietary-surveillance.ru.po 25 Feb 2019 10:00:30 -0000 1.477
+++ proprietary-surveillance.ru.po 28 Feb 2019 09:00:39 -0000 1.478
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-24 13:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3161,6 +3162,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers found a way to break the security of an Amazon device, and <a href="
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary.de-diff.html 23 Feb 2019 12:00:35 -0000 1.51
+++ proprietary.de-diff.html 28 Feb 2019 09:00:39 -0000 1.52
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -125,17 +125,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -185,6 +185,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201902220">
<p>On-line gambling services (and their nonfree
client programs) are <a
@@ -250,12 +264,6 @@
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
-
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
</ul></em></ins></span>
@@ -316,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary.de.po 23 Feb 2019 12:00:35 -0000 1.93
+++ proprietary.de.po 28 Feb 2019 09:00:39 -0000 1.94
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -512,13 +527,6 @@
"what they really do."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.es.po 25 Feb 2019 10:10:20 -0000 1.106
+++ proprietary.es.po 28 Feb 2019 09:00:39 -0000 1.107
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-02-25 11:08+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -298,6 +299,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -431,17 +447,6 @@
"las aplicaciones que no son libres entrañan un riesgo potencial, ya que no "
"es fácil saber qué hacen realmente."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-"Multitud de aplicaciones no libres cuentan con una funcionalidad de "
-"vigilancia que permite <a href=\"https://techcrunch.com/2019/02/06/iphone-"
-"session-replay-screenshots/\">registrar todas las acciones del usuario</a> "
-"en su interacción con la aplicación."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -521,6 +526,16 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Many nonfree apps have a surveillance feature for <a href=\"https://"
+#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+#~ "all the users' actions</a> in interacting with the app."
+#~ msgstr ""
+#~ "Multitud de aplicaciones no libres cuentan con una funcionalidad de "
+#~ "vigilancia que permite <a href=\"https://techcrunch.com/2019/02/06/iphone-"
+#~ "session-replay-screenshots/\">registrar todas las acciones del usuario</"
+#~ "a> en su interacción con la aplicación."
+
+#~ msgid ""
#~ "An investigation of the 150 most popular gratis VPN apps in Google Play "
#~ "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
#~ "index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks.
"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.fr.po 23 Feb 2019 20:08:22 -0000 1.130
+++ proprietary.fr.po 28 Feb 2019 09:00:39 -0000 1.131
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-02-23 20:39+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -428,17 +444,6 @@
"risque potentiel parce qu'on ne peut pas vérifier facilement ce qu'elles "
"font en réalité."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-"De nombreuses applis non libres ont une fonctionnalité de surveillance qui "
-"<a href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-"
-"screenshots/\">enregistre toutes les actions de l'utilisateur</a> pendant "
-"qu'il interagit avec l'appli."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,3 +517,13 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Many nonfree apps have a surveillance feature for <a href=\"https://"
+#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+#~ "all the users' actions</a> in interacting with the app."
+#~ msgstr ""
+#~ "De nombreuses applis non libres ont une fonctionnalité de surveillance "
+#~ "qui <a href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-"
+#~ "screenshots/\">enregistre toutes les actions de l'utilisateur</a> pendant "
+#~ "qu'il interagit avec l'appli."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.it-diff.html 23 Feb 2019 12:00:35 -0000 1.63
+++ proprietary.it-diff.html 28 Feb 2019 09:00:39 -0000 1.64
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201902220">
<p>On-line gambling services (and their nonfree
client programs) are <a
@@ -249,12 +263,6 @@
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
-
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +323,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary.it.po 23 Feb 2019 12:00:35 -0000 1.102
+++ proprietary.it.po 28 Feb 2019 09:00:39 -0000 1.103
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -516,13 +531,6 @@
"what they really do."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.ja-diff.html 23 Feb 2019 12:00:35 -0000 1.64
+++ proprietary.ja-diff.html 28 Feb 2019 09:00:39 -0000 1.65
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -181,6 +181,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201902220">
<p>On-line gambling services (and their nonfree
client programs) are <a
@@ -246,12 +260,6 @@
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
-
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
</ul></em></ins></span>
@@ -312,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary.ja.po 23 Feb 2019 12:00:35 -0000 1.85
+++ proprietary.ja.po 28 Feb 2019 09:00:39 -0000 1.86
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -436,13 +451,6 @@
"what they really do."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.nl-diff.html 23 Feb 2019 12:00:35 -0000 1.63
+++ proprietary.nl-diff.html 28 Feb 2019 09:00:39 -0000 1.64
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201902220">
<p>On-line gambling services (and their nonfree
client programs) are <a
@@ -249,12 +263,6 @@
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
-
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +323,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary.nl.po 23 Feb 2019 12:00:35 -0000 1.74
+++ proprietary.nl.po 28 Feb 2019 09:00:39 -0000 1.75
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -509,13 +524,6 @@
"what they really do."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary.pl-diff.html 23 Feb 2019 12:00:35 -0000 1.81
+++ proprietary.pl-diff.html 28 Feb 2019 09:00:39 -0000 1.82
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
+instances of malicious functionalities (with more than 400 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -129,15 +129,15 @@
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -182,6 +182,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201902220">
<p>On-line gambling services (and their nonfree
client programs) are <a
@@ -247,12 +261,6 @@
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
-
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
</ul></em></ins></span>
@@ -313,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/23 12:00:35 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.pl.po 23 Feb 2019 12:00:35 -0000 1.69
+++ proprietary.pl.po 28 Feb 2019 09:00:39 -0000 1.70
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -591,13 +606,6 @@
"what they really do."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.pot 23 Feb 2019 12:00:36 -0000 1.66
+++ proprietary.pot 28 Feb 2019 09:00:39 -0000 1.67
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a "
"href=\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds\">
"
"designed to be addictive</a>, much like on-line games. They achieve this "
@@ -323,13 +338,6 @@
"what they really do."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a "
-"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
-"recording all the users' actions</a> in interacting with the app."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.pt-br.po 24 Feb 2019 21:01:08 -0000 1.95
+++ proprietary.pt-br.po 28 Feb 2019 09:00:39 -0000 1.96
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-02-24 15:49-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -292,6 +293,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -421,16 +437,6 @@
"potencial, porque não há uma maneira fácil de saber o que eles realmente "
"fazem."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-"Muitos aplicativos não livres têm um recurso de vigilância para <a href="
-"\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> "
-"gravar todas as ações dos usuários</a> na interação com o aplicativo"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +512,15 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Many nonfree apps have a surveillance feature for <a href=\"https://"
+#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+#~ "all the users' actions</a> in interacting with the app."
+#~ msgstr ""
+#~ "Muitos aplicativos não livres têm um recurso de vigilância para <a
href="
+#~ "\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> "
+#~ "gravar todas as ações dos usuários</a> na interação com o aplicativo"
+
+#~ msgid ""
#~ "An investigation of the 150 most popular gratis VPN apps in Google Play "
#~ "found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
#~ "index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks.
"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.ru.po 25 Feb 2019 10:00:30 -0000 1.162
+++ proprietary.ru.po 28 Feb 2019 09:00:39 -0000 1.163
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -429,16 +445,6 @@
"ÑиÑком, поÑÐ¾Ð¼Ñ ÑÑо Ð½ÐµÑ Ð¿ÑоÑÑого ÑпоÑоба
ÑзнаÑÑ, ÑÑо они в дейÑÑвиÑелÑноÑÑи "
"делаÑÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-"Ðо многиÑ
неÑвободнÑÑ
пÑиложениÑÑ
еÑÑÑ <a
href=\"https://techcrunch."
-"com/2019/02/06/iphone-session-replay-screenshots/\"> запиÑÑ Ð²ÑеÑ
дейÑÑвий "
-"полÑзоваÑелей</a> пÑи ÑабоÑе Ñ Ð¿Ñиложением."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -518,6 +524,15 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Many nonfree apps have a surveillance feature for <a href=\"https://"
+#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+#~ "all the users' actions</a> in interacting with the app."
+#~ msgstr ""
+#~ "Ðо многиÑ
неÑвободнÑÑ
пÑиложениÑÑ
еÑÑÑ
<a href=\"https://techcrunch."
+#~ "com/2019/02/06/iphone-session-replay-screenshots/\"> запиÑÑ Ð²ÑеÑ
дейÑÑвий "
+#~ "полÑзоваÑелей</a> пÑи ÑабоÑе Ñ
пÑиложением."
+
+#~ msgid ""
#~ "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
#~ "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"
#~ "\">degrade the performance of older phones to force users to buy their "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary.zh-tw-diff.html 23 Feb 2019 12:00:36 -0000 1.41
+++ proprietary.zh-tw-diff.html 28 Feb 2019 09:00:39 -0000 1.42
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -125,17 +125,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -185,6 +185,20 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
+ paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use of a printer that would otherwise be in
+ working order.</p>
+ </li>
+
<li id="M201902220">
<p>On-line gambling services (and their nonfree
client programs) are <a
@@ -250,12 +264,6 @@
general. <em>All</em> nonfree apps carry a potential risk
because
there is no easy way of knowing what they really do.</p>
</li>
-
- <li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
</ul></em></ins></span>
@@ -316,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/23 12:00:36 $
+$Date: 2019/02/28 09:00:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary.zh-tw.po 23 Feb 2019 12:00:36 -0000 1.52
+++ proprietary.zh-tw.po 28 Feb 2019 09:00:39 -0000 1.53
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-23 11:56+0000\n"
+"POT-Creation-Date: 2019-02-28 08:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"On-line gambling services (and their nonfree client programs) are <a href="
"\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
"dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much like "
@@ -425,13 +440,6 @@
"what they really do."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many nonfree apps have a surveillance feature for <a href=\"https://"
-"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
-"all the users' actions</a> in interacting with the app."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- pt-br.po 25 Feb 2019 10:31:07 -0000 1.50
+++ pt-br.po 28 Feb 2019 09:00:39 -0000 1.51
@@ -1251,6 +1251,21 @@
msgstr ""
#. type: Content of: <ul><li><p>
+msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- ru.po 25 Feb 2019 10:31:07 -0000 1.82
+++ ru.po 28 Feb 2019 09:00:40 -0000 1.83
@@ -1677,6 +1677,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- zh-tw.po 25 Feb 2019 10:31:07 -0000 1.36
+++ zh-tw.po 28 Feb 2019 09:00:40 -0000 1.37
@@ -1248,6 +1248,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
+"“ink subscription” cartridges have DRM that constantly "
+"communicates with HP servers</a> to make sure the user is still paying for "
+"the subscription, and hasn't printed more pages than were paid for."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even though the ink subscription program may be cheaper in some specific "
+"cases, it spies on users, and involves totally unacceptable restrictions in "
+"the use of a printer that would otherwise be in working order."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
"video they capture to Amazon servers</a>, which save it long-term."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., (continued)
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/24
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28