[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 28 Feb 2019 04:30:41 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/28 04:30:40
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.478&r2=1.479
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.37&r2=1.38
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- de.po 28 Feb 2019 09:00:38 -0000 1.37
+++ de.po 28 Feb 2019 09:30:38 -0000 1.38
@@ -7244,6 +7244,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- es.po 28 Feb 2019 09:00:38 -0000 1.47
+++ es.po 28 Feb 2019 09:30:38 -0000 1.48
@@ -5289,6 +5289,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- fr.po 28 Feb 2019 09:00:38 -0000 1.65
+++ fr.po 28 Feb 2019 09:30:38 -0000 1.66
@@ -5750,6 +5750,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- it.po 28 Feb 2019 09:00:38 -0000 1.37
+++ it.po 28 Feb 2019 09:30:38 -0000 1.38
@@ -6817,6 +6817,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- ja.po 28 Feb 2019 09:00:38 -0000 1.37
+++ ja.po 28 Feb 2019 09:30:38 -0000 1.38
@@ -5792,6 +5792,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-mobiles.de-diff.html 20 Feb 2019 15:30:47 -0000 1.42
+++ malware-mobiles.de-diff.html 28 Feb 2019 09:30:38 -0000 1.43
@@ -494,6 +494,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -857,38 +869,38 @@
to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
tens of thousands</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude.</a></p></strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
- it can alter them too</a>.</p></em></ins></span>
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601130">
- <p>Apps that include</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ <li id="M201601130">
+ <p>Apps</em></ins></span> that <span
class="removed"><del><strong>collude.</a></p></strong></del></span>
<span class="inserted"><ins><em>include <a
+
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>that install the app</a>.</p>
-
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
- <li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this
point,</strong></del></span> <span class="inserted"><ins><em>make sure they
can't “fool”
- the monitoring</a>.</p>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601110">
+ <p>The natural extension of monitoring
+ people through “their” phones is</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't
“fool”</em></ins></span>
+ the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated to the app's functionality, was <a
+ unrelated to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
+ found in</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not enough
+to legitimize actions like this. At this point,</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
<p>The article should not</em></ins></span> have
<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>described these apps as
@@ -1264,7 +1276,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 15:30:47 $
+$Date: 2019/02/28 09:30:38 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- malware-mobiles.de.po 20 Feb 2019 15:30:47 -0000 1.99
+++ malware-mobiles.de.po 28 Feb 2019 09:30:38 -0000 1.100
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -798,6 +798,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- malware-mobiles.es.po 21 Feb 2019 12:21:09 -0000 1.105
+++ malware-mobiles.es.po 28 Feb 2019 09:30:38 -0000 1.106
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 09:26+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -687,6 +688,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- malware-mobiles.fr.po 21 Feb 2019 11:13:30 -0000 1.125
+++ malware-mobiles.fr.po 28 Feb 2019 09:30:38 -0000 1.126
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2019-02-21 12:12+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 09:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -688,6 +689,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- malware-mobiles.it-diff.html 20 Feb 2019 15:30:47 -0000 1.47
+++ malware-mobiles.it-diff.html 28 Feb 2019 09:30:38 -0000 1.48
@@ -522,6 +522,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -810,8 +822,7 @@
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
- <span class="removed"><del><strong>and may turn them over to the UK
government if
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
<span class="removed"><del><strong>may turn them over to the UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -864,8 +875,8 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>and
- may turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span class="inserted"><ins><em>may turn them over to</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
@@ -1293,7 +1304,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 15:30:47 $
+$Date: 2019/02/28 09:30:38 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- malware-mobiles.it.po 20 Feb 2019 15:30:47 -0000 1.99
+++ malware-mobiles.it.po 28 Feb 2019 09:30:39 -0000 1.100
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -767,6 +767,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.ja-diff.html 20 Feb 2019 15:30:47 -0000 1.61
+++ malware-mobiles.ja-diff.html 28 Feb 2019 09:30:39 -0000 1.62
@@ -486,6 +486,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -1136,7 +1148,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 15:30:47 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-mobiles.ja.po 20 Feb 2019 15:30:47 -0000 1.87
+++ malware-mobiles.ja.po 28 Feb 2019 09:30:39 -0000 1.88
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -636,6 +636,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.pot 20 Feb 2019 15:30:47 -0000 1.65
+++ malware-mobiles.pot 28 Feb 2019 09:30:39 -0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -467,6 +467,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a "
+"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\"> "
+"sent personal data to Facebook</a>. Lots of companies built apps that way "
+"and released them, apparently not realizing that all the personal data they "
+"collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a "
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
"recording all the users' actions</a> in interacting with the app."
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- malware-mobiles.ru.po 25 Feb 2019 10:00:30 -0000 1.159
+++ malware-mobiles.ru.po 28 Feb 2019 09:30:39 -0000 1.160
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 09:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -678,6 +679,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- nl.po 28 Feb 2019 09:00:38 -0000 1.37
+++ nl.po 28 Feb 2019 09:30:39 -0000 1.38
@@ -4574,6 +4574,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- pl.po 28 Feb 2019 09:00:38 -0000 1.37
+++ pl.po 28 Feb 2019 09:30:39 -0000 1.38
@@ -4018,6 +4018,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- pot 28 Feb 2019 09:00:38 -0000 1.37
+++ pot 28 Feb 2019 09:30:39 -0000 1.38
@@ -3841,6 +3841,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary-surveillance.de-diff.html 28 Feb 2019 09:00:39 -0000
1.49
+++ proprietary-surveillance.de-diff.html 28 Feb 2019 09:30:39 -0000
1.50
@@ -656,63 +656,38 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>stores detailed logs
- and may turn them over</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.</p>
+ illegal to study how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In</em></ins></span> the
- <span class="removed"><del><strong>users. The stated purpose
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
- “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="removed"><del><strong>JS injection is</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>be spied on”.</p>
+ know you want to be spied on”.</p>
</li>
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
- to use</em></ins></span> it <span class="removed"><del><strong>redirects
the
- user's traffic through valueclick.com (an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers of this
app</strong></del></span> <span class="inserted"><ins><em>without having your
fingerprints taken. Users would</em></ins></span> have
- <span class="removed"><del><strong>confirmed that the non-premium
version of</strong></del></span>
- <span class="inserted"><ins><em>no way to tell whether</em></ins></span>
the <span class="removed"><del><strong>app does
- JavaScript injection for tracking and display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>phone is
snooping on them.</p></em></ins></span>
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether the phone is snooping on them.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <span class="inserted"><ins><em><li id="M201611170">
+ <li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span class="inserted"><ins><em>personal data to
Apple's servers</a>. Big Brother can get
+ lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>photos
+ <p>iThings automatically upload to Apple's servers all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -721,13 +696,13 @@
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>paid proprietary
apps,</strong></del></span>
- <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
<p>There is a way to
<a href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so</em></ins></span> it <span
class="removed"><del><strong>was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em>still counts as a
+ iCloud</a>, but it's active by default so it still counts as a
surveillance functionality.</p>
<p>Unknown people apparently took advantage of this to <a
@@ -772,8 +747,8 @@
is totally incompetent</a>.</p>
</li>
- <li id="M201308080"></em></ins></span>
- <p>The <span class="inserted"><ins><em>iThing also <a
+ <li id="M201308080">
+ <p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
@@ -782,7 +757,7 @@
<li id="M201210170">
<p>There is also a feature for web sites to track users, which is
<a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</em></ins></span> article <span
class="removed"><del><strong>confusingly describes gratis apps as
“free”,</strong></del></span> <span class="inserted"><ins><em>talks
about iOS 6,</em></ins></span> but <span
class="removed"><del><strong>most</strong></del></span> <span
class="inserted"><ins><em>it is
+ enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
@@ -819,94 +794,90 @@
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</em></ins></span> of <span
class="removed"><del><strong>them are not in fact</strong></del></span> <span
class="inserted"><ins><em>data to China</a>.</p>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201609140">
- <p>Google Play (a component of Android)</em></ins></span> <a
<span class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>users'
movements without their permission</a>.</p>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking.
This</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p></strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending to obey the user,
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>tracking.
This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></em></ins></span>
+ unthinkable with free software.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</em></ins></span>
- that <span class="inserted"><ins><em>users can't delete</a>,
and</em></ins></span> they <span class="removed"><del><strong>don't
snoop.</p>
- <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>send so much data</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>their
+ <li id="M201507030">
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some kind.</p></em></ins></span>
+ of some kind.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120">
+ <li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the
system.</p>
</li>
<li id="M201308010">
- <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps that track users</strong></del></span> <span
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us</em></ins></span> by <span
class="inserted"><ins><em>a paywall) reports that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone</em></ins></span> in
<span class="removed"><del><strong>stores or played by TV programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>Android phones
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
+ <li id="M201307280">
<p>Spyware is present in some Android devices when they are
sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version</em></ins></span> of Android <span
class="removed"><del><strong>apps can collude to transmit
users'</strong></del></span> <span class="inserted"><ins><em>that <a
+ by Google, use a modified version of Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends</em></ins></span> personal data to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>read logs</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></em></ins></span>
+ <p>A Motorola phone <a
+
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</em></ins></span> for <span class="removed"><del><strong>other
apps and also core system logs. TigerVPN</strong></del></span> <span
class="inserted"><ins><em>voice all the time</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+ <li id="M201302150">
+ <p>Google Play intentionally sends app</em></ins></span> developers
+ <span class="removed"><del><strong>have confirmed this.</dd>
- <span class="inserted"><ins><em><li id="M201302150"></em></ins></span>
- <p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that <span
class="removed"><del><strong>install the app</a>.</p>
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ and may turn them over to</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>UK government if
+ requested.</dd>
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>install the app</a>.</p>
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into</strong></del></span> <span
class="inserted"><ins><em>personal details of users that
install</em></ins></span> the <span class="removed"><del><strong>HTML pages
returned to</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
- <p>Merely asking the “consent” of users is not enough to
- legitimize actions like this. At this point, most users have stopped
+ <p>Merely asking</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span
class="inserted"><ins><em>“consent”</em></ins></span> of <span
class="removed"><del><strong>the JS injection</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> is <span
class="inserted"><ins><em>not enough</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
+ honestly identify the information</em></ins></span> it <span
class="removed"><del><strong>redirects</strong></del></span> <span
class="inserted"><ins><em>collects on users, instead of
hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ and other companies from getting this personal information
in</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects</strong></del></span>
+ <span class="inserted"><ins><em>first place!</p>
</li>
<li id="M201111170">
@@ -924,9 +895,11 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
+ <p>E-books can contain</em></ins></span> JavaScript <span
class="removed"><del><strong>code into HTML pages,</strong></del></span> <span
class="inserted"><ins><em>code,</em></ins></span> and <span
class="removed"><del><strong>also uses
+ roughly 5 tracking libraries. Developers of</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ sometimes</em></ins></span> this <span class="removed"><del><strong>app
have
+ confirmed that</strong></del></span> <span
class="inserted"><ins><em>code snoops on readers</a>.</p>
</li>
<li id="M201410080">
@@ -938,16 +911,20 @@
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
+ <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>non-premium version of</strong></del></span>
<span class="inserted"><ins><em>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what time</a>.</p>
+ report even which page</em></ins></span> the <span
class="removed"><del><strong>app does
+ JavaScript injection for tracking and display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>user reads
at what time</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
+ <h3 id="SpywareInApplications">Spyware</em></ins></span> in <span
class="removed"><del><strong>2015</a> found</strong></del></span> <span
class="inserted"><ins><em>Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -964,15 +941,28 @@
reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized
copies</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>nonfree software</em></ins></span>
- is not <span class="removed"><del><strong>enough
-to legitimize actions like this. At this point, most
users</strong></del></span> <span class="inserted"><ins><em>a cure for the
injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
+ <p>The fact</em></ins></span> that <span
class="removed"><del><strong>90%</strong></del></span> <span
class="inserted"><ins><em>this is used for repression</em></ins></span> of
<span class="removed"><del><strong>the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>forbidden sharing
+ makes</em></ins></span> it <span class="removed"><del><strong>was only
60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>even more
vicious.</p>
+
+ <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="removed"><del><strong>them
are</strong></del></span> <span class="inserted"><ins><em>nonfree software
+ is</em></ins></span> not <span class="removed"><del><strong>in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>a cure
for</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>that word
is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li>
+ <p>Apps for BART
+ <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -980,6 +970,38 @@
</div>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary
+ <span class="inserted"><ins><em>library for building
mobile</em></ins></span> apps, <span class="removed"><del><strong>one can only
hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span> <span class="inserted"><ins><em>which
also</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs of Android apps can collude to transmit
users'</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent</em></ins></span> personal data to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>companies built apps</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p>
+</li>
+
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span class="inserted"><ins><em>way and released them, apparently not
realizing that all</em></ins></span> the personal <span
class="removed"><del><strong>details of users</strong></del></span>
+ <span class="inserted"><ins><em>data they collected would go to Facebook
as well.</p>
+
+ <p>It shows</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>no one can trust a nonfree program, not
even</em></ins></span> the <span
class="removed"><del><strong>“consent”</strong></del></span>
+ <span class="inserted"><ins><em>developers</em></ins></span> of <span
class="removed"><del><strong>users is not enough
+to legitimize actions like this. At this point, most
users</strong></del></span> <span class="inserted"><ins><em>other nonfree
programs.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps</em></ins></span> have
<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>a surveillance feature for <a
@@ -1948,8 +1970,8 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The
other day a woman came up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
+<p>Emo Phillips made a joke: The other day</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>woman came
up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see</em></ins></span> out
<span class="removed"><del><strong>who</strong></del></span> the <span
class="removed"><del><strong>user was.</p>
@@ -2639,9 +2661,9 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>internet to another
- company, Nuance</a>. Nuance can save it and would then
have</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="inserted"><ins><em>normal that companies
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it and would then have to
+ give</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="inserted"><ins><em>normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -3255,7 +3277,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary-surveillance.de.po 28 Feb 2019 09:00:39 -0000 1.264
+++ proprietary-surveillance.de.po 28 Feb 2019 09:30:39 -0000 1.265
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1849,6 +1849,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- proprietary-surveillance.fr.po 28 Feb 2019 09:00:39 -0000 1.383
+++ proprietary-surveillance.fr.po 28 Feb 2019 09:30:39 -0000 1.384
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2019-02-25 13:03+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -1408,6 +1408,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary-surveillance.it-diff.html 28 Feb 2019 09:00:39 -0000
1.116
+++ proprietary-surveillance.it-diff.html 28 Feb 2019 09:30:39 -0000
1.117
@@ -1132,7 +1132,7 @@
<p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Many
proprietary</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1141,296 +1141,376 @@
</div>
<ul class="blurbs">
- <li id="M201902060">
- <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p>
- </li>
-
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera”</em></ins></span> apps
<span class="inserted"><ins><em>that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ <li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
+ apps the user has
+ installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
+ data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps
that</em></ins></span> used <span class="inserted"><ins><em>to
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads on users, and redirecting
+ pushing unwanted and often malicious ads</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is in addition to
+ the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>redirecting
them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the user <span class="removed"><del><strong>has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was designed to make
uninstallation
+ the <span class="removed"><del><strong>question</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>most of them
was designed</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree
apps</em></ins></span> in
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>potential risk
because
- there</em></ins></span> is <span class="removed"><del><strong>visible and
- optional</a>. Not as bad as</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span
class="removed"><del><strong>the others</strong></del></span> <span
class="inserted"><ins><em>they really</em></ins></span> do.</p>
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there</em></ins></span> is no <span class="removed"><del><strong>excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>FTC
says</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not
+ ask about sending it to other companies. This shows the
+ weakness</strong></del></span>
<span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile</strong></del></span> <span
class="inserted"><ins><em>popular
- gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for
children don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>An investigation</em></ins></span> of the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p>
</li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>150 most popular
+ gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
- <li><p>Widely</strong></del></span>
+<ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>Google Play
found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ 25% fail</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span> <span class="inserted"><ins><em>protect
their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often</em></ins></span> used <span
class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ source code—often used</em></ins></span> for <span
class="removed"><del><strong>companies, and the NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>invasive
advertising—that could
+ potentially also be used</em></ins></span> to spy <span
class="removed"><del><strong>through it too</a>.
+ Here's information</strong></del></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps have lousy privacy policies</a>.</p>
+ <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
- <p>It</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that
these articles talk about “free
+ <p>It is unfortunate that these articles talk</em></ins></span>
about <span class="removed"><del><strong>NSA app
spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“free
apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS in</strong></del></span> <span class="inserted"><ins><em>company's
server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>what it will do
- with</em></ins></span> the <span class="removed"><del><strong>app
developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>about
a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901050"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
+ a speech recognition company based in</strong></del></span> the <span
class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>toys</strong></del></span> <span
class="inserted"><ins><em>users of what it will do</em></ins></span>
+ with <span class="inserted"><ins><em>the data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
+ enable crackers to listen in on a child's speech, and even speak
+ into</strong></del></span> <span class="inserted"><ins><em>side issue.
What</em></ins></span> the <span class="removed"><del><strong>toys
themselves.</p>
+ </li>
+
+ <li>
+ <p>A computerized vibrator
+ <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>proprietary
control app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>data
is</em></ins></span> a <span class="removed"><del><strong>person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>secondary issue. The principal wrong here is
that</em></ins></span>
+ the <span class="removed"><del><strong>totally inadequate proposed
response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
+
+ <p>The</strong></del></span> company <span
class="inserted"><ins><em>gets</em></ins></span> that <span
class="removed"><del><strong>made the vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ tracking people's locations.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+ <li id="M201812290">
+ <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people used it</a>.</p>
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,”
so</em></ins></span> that <span class="removed"><del><strong>it was
anonymizing</strong></del></span>
+ <span class="inserted"><ins><em>Facebook can correlate</em></ins></span>
the data <span class="removed"><del><strong>may be
+ true, but it doesn't really matter. If</strong></del></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>data to a
+ data broker,</strong></del></span> <span class="inserted"><ins><em>same
machine via
+ various apps. Some of them send Facebook detailed information
about</em></ins></span>
+ the <span class="removed"><del><strong>data broker would have been able to
figure out
+ who</strong></del></span> <span class="inserted"><ins><em>user's
activities in the app; others only say that</em></ins></span> the user <span
class="removed"><del><strong>was.</p>
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's actions</em></ins></span> to
- <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>it obtains from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask</strong></del></span> <span class="inserted"><ins><em>same machine
via
- various apps. Some of them send Facebook detailed
information</em></ins></span> about <span class="removed"><del><strong>sending
it to other companies. This shows</strong></del></span>
- the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's activities in the app; others only say that
the user is
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>user has</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
+ <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> has <span
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span
class="removed"><del><strong>total of C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
account.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
<span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends personal data
about them to
- nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that have deleted
them</a>.</p></em></ins></span>
+ track</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>phones of users
that have deleted them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span>
+ <li id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information on</strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected</strong></del></span> <span class="inserted"><ins><em>other
kinds of location
+ tracking, but most users will be tricked</em></ins></span> by the <span
class="removed"><del><strong>manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
- </li>
-</ul>
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="removed"><del><strong>the FBI could listen</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
+ <p>This makes them act as spies for licensing enforcement.</p>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>these conversations
+ was unacceptable by itself.</p></li>
-<ul>
- <li>
- <p>The “smart” toys My Friend Cayla</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>listens
through the microphone</a>.</p>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from the article.</p>
- <p>This makes them act as spies for licensing enforcement.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
+ </li>
- <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
- a <span class="removed"><del><strong>speech recognition company based in
the U.S.</p>
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>adults</a>.</p>
+ </li>
+</ul>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span>
the <span class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span class="removed"><del><strong>on a child's
speech, and even speak
- into the toys themselves.</p></strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one
more.</p></em></ins></span>
- </li>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about</em></ins></span> its <span
class="removed"><del><strong>users through</strong></del></span> <span
class="inserted"><ins><em>users</a>. 40% of</em></ins></span> the <span
class="inserted"><ins><em>apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>control app</a>.</p>
- <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>apps whose
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
- need to get rid</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android</em></ins></span> by <span class="removed"><del><strong>a person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em><a href="https://replicant.us">switching to
Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> free software <span
class="removed"><del><strong>which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span>
- <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a></em></ins></span> that
<span class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
+ need to get rid of the proprietary software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>spyware via BIOS</a> on
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the proprietary
apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="inserted"><ins><em><a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>vibrator</strong></del></span>
<span class="inserted"><ins><em>user if an app contains
anti-features</a>.</p>
+ the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p>
</li>
<li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal</strong></del></span>
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much</em></ins></span> information
about <span class="removed"><del><strong>how
- people used it</a>.</p>
+ <p>Grindr should not have so much information
about</em></ins></span> its <span class="removed"><del><strong>own
malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>users.
+ It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <p>The company's statement that it was anonymizing the data
may</strong></del></span> <span class="inserted"><ins><em>its users.
- It could</em></ins></span> be
- <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold the data</strong></del></span> <span
class="inserted"><ins><em>designed so that users communicate such
info</em></ins></span> to <span class="removed"><del><strong>a
- data broker, the data broker would have been able</strong></del></span>
<span class="inserted"><ins><em>each
- other but not</em></ins></span> to <span
class="removed"><del><strong>figure out
- who</strong></del></span> the <span class="removed"><del><strong>user
was.</p>
+ <p>Specifically, it can collect</strong></del></span>
+ <span class="inserted"><ins><em>other but not to</em></ins></span> the
<span class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>server's database.</p>
</li>
<li id="M201803050">
<p>The moviepass app and dis-service
- spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span>
+ spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> a <span
class="removed"><del><strong>total of C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?</strong></del></span>
+<ul>
+ <li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+ is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>way to
access the data</a>
- collected</strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store</em></ins></span> by <span
class="removed"><del><strong>the manufacturer's snooping.</p>
-
- <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>noticing WiFi
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="inserted"><ins><em>email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>words
+ <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to <span class="removed"><del><strong>these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>zero price.</p>
+ referring to zero price.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
- </li>
-</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>sent them and text messages and
emails</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>top under each subsection -->
+ <span class="inserted"><ins><em><li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
-
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>the contrary, it
- worked</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that,</em></ins></span> and
<span class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.
-Note that the specific sabotage method Lenovo</strong></del></span> <span
class="inserted"><ins><em>deleted these apps after
+ <li>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span>
+ <span class="inserted"><ins><em>worked in various ways to prevent that,
and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
@@ -1439,7 +1519,7 @@
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
+ cheating? There</em></ins></span> is <span
class="removed"><del><strong>using it</strong></del></span> <span
class="inserted"><ins><em>no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
@@ -1958,10 +2038,9 @@
<li id="M201504300">
<p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
- used <span class="inserted"><ins><em>a firmware “upgrade” to
make its TVs snoop on what
- users watch</a>. The TVs</em></ins></span> did not <span
class="removed"><del><strong>affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>do that
when first sold.</p>
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
@@ -1996,91 +2075,26 @@
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install
is</strong></del></span> <span class="inserted"><ins><em>user declines consent?
Probably the TV will
- say, “Without your consent to tracking, the TV
will</em></ins></span> not <span class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em>work.”</p>
-
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>place new items on top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405200">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
+ work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
-</ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ <li id="M201405200">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+ snoops on other devices on the user's local network</a>.</p>
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>other devices</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>user's local network</a>.</p>
-
- <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A</strong></del></span> <span class="inserted"><ins><em>had
installed a patch to stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
@@ -2091,9 +2105,9 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a</em></ins></span>
“smart” <span class="removed"><del><strong>device means the
manufacturer is using it</strong></del></span> <span
class="inserted"><ins><em>TV</a>
- and use its camera</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>break security on a “smart” TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
@@ -2182,9 +2196,9 @@
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
+ modem enables</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
</li>
</ul>
@@ -2321,10 +2335,11 @@
<ul>
<li>
<p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that</strong></del></span> <span
class="inserted"><ins><em>people, DJI</em></ins></span> is <span
class="removed"><del><strong>viewed</strong></del></span> <span
class="inserted"><ins><em>in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>them, and not just broadcasts
+ and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
</li>
</ul>
@@ -2337,8 +2352,7 @@
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>constantly
+ “ink subscription” cartridges have DRM that constantly
communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>coming from</strong></del></span> <span
class="inserted"><ins><em>still
paying for</em></ins></span> the <span class="removed"><del><strong>user's
own
computer,</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
@@ -2446,35 +2460,33 @@
<p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>do.</p></em></ins></span>
+ correlate ads</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>back door, but that could be a
+ <p>The article says this is a back door, but that could be a
misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
<span class="inserted"><ins><em><li id="M201407090">
- <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
+ <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize and</strong></del></span> <span
class="inserted"><ins><em>watch is designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't a TV channel.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to transmit conversations
+ to report its location to someone else and to transmit conversations
too</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -2485,13 +2497,17 @@
<ul class="blurbs">
<li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ tracked</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+ <li><p>The Samsung “Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
<span class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ <p>GM did not get</em></ins></span> users' <span
class="removed"><del><strong>voice on the internet to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
<p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
@@ -2598,27 +2614,27 @@
<li><p>Modern gratis game cr…apps
<a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of</strong></del></span> <span
class="inserted"><ins><em>company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
- friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+ data <span class="removed"><del><strong>about their users and their users'
+ friends</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span
class="inserted"><ins><em>determine</em></ins></span> the <span
class="removed"><del><strong>data
+ collected by various cr…apps</strong></del></span> <span
class="inserted"><ins><em>car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>sites made by different
+ companies.</p>
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+ <p>They use</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
- information, but if the state orders it to get</em></ins></span> the data
- <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state can store it.</p>
+ privacy statement</a>.) The company says it doesn't
store</em></ins></span> this <span class="removed"><del><strong>data to
manipulate people</strong></del></span>
+ <span class="inserted"><ins><em>information, but if the state orders
it</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>get the
data</em></ins></span> and <span class="removed"><del><strong>hunt
+ for “whales” who</strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state</em></ins></span> can <span
class="removed"><del><strong>be led</strong></del></span> <span
class="inserted"><ins><em>store it.</p>
</li>
<li id="M201303250">
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
- companies.</p>
-
- <p>They use this data to manipulate people</strong></del></span>
- <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
+ records information about drivers' movements</a>, which is made
+ available</em></ins></span> to <span class="removed"><del><strong>spend a
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers,
insurance companies, and others.</p>
<p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -3019,7 +3035,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- proprietary-surveillance.it.po 28 Feb 2019 09:00:39 -0000 1.277
+++ proprietary-surveillance.it.po 28 Feb 2019 09:30:39 -0000 1.278
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1799,6 +1799,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary-surveillance.ja-diff.html 28 Feb 2019 09:00:39 -0000
1.126
+++ proprietary-surveillance.ja-diff.html 28 Feb 2019 09:30:39 -0000
1.127
@@ -1026,7 +1026,7 @@
<p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Many
proprietary</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1035,25 +1035,35 @@
</div>
<ul class="blurbs">
- <li id="M201902060">
- <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>mobile devices report which other
+ <li id="M201902230">
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
apps the user has
- installed.</strong></del></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>a way that at least is visible and
- optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>interacting with</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
+ installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
+ data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera”</em></ins></span> apps
<span class="removed"><del><strong>for children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
</li>
- <li><p>Widely</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> used <span
class="inserted"><ins><em>to
+ <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps
that</em></ins></span> used <span class="inserted"><ins><em>to
be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
QR-code scanner apps snoop</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
@@ -1147,18 +1157,12 @@
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the</em></ins></span> company's <span
class="removed"><del><strong>statement</strong></del></span> <span
class="inserted"><ins><em>server</a>. The company is
being sued, demanding</em></ins></span> that it <span
class="removed"><del><strong>anonymizes</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span class="removed"><del><strong>data
to</strong></del></span> <span class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit is about</em></ins></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
- with</em></ins></span> the data <span class="removed"><del><strong>broker
can figure out who</strong></del></span> <span class="inserted"><ins><em>is a
secondary issue. The principal wrong here is that</em></ins></span>
- the <span class="removed"><del><strong>user is.</p>
- </li>
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>sells the data to</strong></del></span> <span
class="inserted"><ins><em>will do
+ with the data.</p>
- <li><p>A computerized
- vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through</strong></del></span> <span
class="inserted"><ins><em>company gets that data at all.</p>
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="inserted"><ins><em>side issue. What the company does
+ with the</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>is a secondary issue. The principal wrong here is
that</em></ins></span>
+ the <span class="inserted"><ins><em>company gets that</em></ins></span>
data <span class="removed"><del><strong>broker</strong></del></span> <span
class="inserted"><ins><em>at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1169,48 +1173,71 @@
<li id="M201812290">
<p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
-
- <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
+ report on the user's actions to Facebook</a>.</p>
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
- Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>is surrounded by a person's
- body), and</strong></del></span> <span class="inserted"><ins><em>obtains
from</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>same
machine via
- various apps. Some of them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>user's
activities in the app; others only say that the user is
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook</em></ins></span> can <span class="removed"><del><strong>figure
out who</strong></del></span> <span class="inserted"><ins><em>correlate the
data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether the user
has</em></ins></span> a <span class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>Facebook
- account.</p>
+ <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>is.</p></strong></del></span>
<span class="inserted"><ins><em>has a Facebook
+ account.</p></em></ins></span>
</li>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of</em></ins></span> users <span
class="removed"><del><strong>can check
- and change.</p></strong></del></span> <span
class="inserted"><ins><em>that have deleted
them</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+ <li id="M201808030">
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>disable “location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
+ <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
-<span class="removed"><del><strong></ul>
+
+ <li id="M201806110"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>Spanish football
streaming</em></ins></span> app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>temperature
of</strong></del></span> <span class="inserted"><ins><em>user's movements and
listens through</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>surrounded
by</strong></del></span> <span class="inserted"><ins><em>no way to
save</em></ins></span>
+ a <span class="removed"><del><strong>person's
+ body), and the vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span>
the <span class="removed"><del><strong>totally inadequate proposed response: a
labeling
+ standard with which manufacturers would make
statements</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn to care much less</em></ins></span> about
+ <span class="removed"><del><strong>their products, rather than free
software which users can check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit in
+ many ways. This is one more.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>adults.</a>.</p>
+ </li>
+</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1220,31 +1247,44 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>listens
through</em></ins></span> the <span class="removed"><del><strong>specific
sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>microphone</a>.</p>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>spyware via BIOS</a> on
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the proprietary
apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="inserted"><ins><em><a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p>
+ </li>
- <p>This makes them act as spies for licensing enforcement.</p>
+ <li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
- <p>I expect it implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
+ <p>Grindr should not have so much information
about</em></ins></span> its <span class="removed"><del><strong>own
malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>users.
+ It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1254,107 +1294,50 @@
<ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>save
- a recording. But I can't be sure from the article.</p>
-
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
- </li>
-
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
<p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop
- and collect information about its users</a>. 40%</em></ins></span>
of <span class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>snooping, in these proprietary apps whose
- source code</em></ins></span> they <span class="removed"><del><strong>pass
it through Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>cannot look at. The other apps might be
snooping</em></ins></span>
- in <span class="removed"><del><strong>Cisco TNP IP
phones:</strong></del></span> <span class="inserted"><ins><em>other
ways.</p>
-
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
- the user if an app contains
anti-features</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
- companies</a>.</p>
-
- <p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span>
- <span class="inserted"><ins><em>other but not to the server's
database.</p>
+ <span class="inserted"><ins><em>other but not to</em></ins></span> the
<span class="removed"><del><strong>emails of members of Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
</li>
<li id="M201803050">
<p>The moviepass app and dis-service
- spy</em></ins></span> on <span class="removed"><del><strong>The
Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
+ where</em></ins></span> they <span class="removed"><del><strong>pass it
through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>travel before and after going to a
movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+ is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
<ul>
- <li>
- <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
-
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
- </li>
+ <li><p>Spyware in Skype:</strong></del></span>
- <li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ <span class="inserted"><ins><em><li id="M201708270">
+ <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
@@ -1362,14 +1345,21 @@
</li>
<li id="M201707270">
- <p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
<p>Google did not intend to make these apps spy; on the contrary, it
worked in various ways to prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ discovering what they did. So we cannot blame Google</em></ins></span>
specifically
+ for <span class="removed"><del><strong>spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
@@ -1378,8 +1368,8 @@
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
+ cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>inspect executable
proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
the source code somehow to determine whether they mistreat users in
@@ -1389,13 +1379,22 @@
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> each <span
class="removed"><del><strong>subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>other.</p>
</li>
<li id="M201705230">
<p>Apps for BART <a
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
+ snoop</em></ins></span> on <span class="removed"><del><strong>The
Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
@@ -1406,7 +1405,13 @@
<li id="M201705040">
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
+ to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is</strong></del></span>
<span class="inserted"><ins><em>stores or played by TV
programs</a>.</p>
</li>
@@ -1840,7 +1845,7 @@
</li>
<li id="M201702060">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
@@ -1919,11 +1924,8 @@
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV</em></ins></span> is <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when the “owner” switches it
“off.”</p>
- <p>A</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -1959,8 +1961,11 @@
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
@@ -2845,7 +2850,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- proprietary-surveillance.ja.po 28 Feb 2019 09:00:39 -0000 1.250
+++ proprietary-surveillance.ja.po 28 Feb 2019 09:30:39 -0000 1.251
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1492,6 +1492,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary-surveillance.pot 28 Feb 2019 09:00:39 -0000 1.198
+++ proprietary-surveillance.pot 28 Feb 2019 09:30:39 -0000 1.199
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -997,6 +997,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a "
+"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\"> "
+"sent personal data to Facebook</a>. Lots of companies built apps that way "
+"and released them, apparently not realizing that all the personal data they "
+"collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a "
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
"recording all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.478
retrieving revision 1.479
diff -u -b -r1.478 -r1.479
--- proprietary-surveillance.ru.po 28 Feb 2019 09:00:39 -0000 1.478
+++ proprietary-surveillance.ru.po 28 Feb 2019 09:30:39 -0000 1.479
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -1395,6 +1395,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary.de-diff.html 28 Feb 2019 09:00:39 -0000 1.52
+++ proprietary.de-diff.html 28 Feb 2019 09:30:39 -0000 1.53
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -125,17 +125,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
-<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -248,22 +260,6 @@
fingerprint sensors in the display</a>. Does that imply they could
take the fingerprint of anyone who operates the touch screen?</p>
</li>
-
- <li id="M201902041">
- <p>Twenty nine “beauty camera” apps that used to be
- on Google Play had one or more malicious functionalities, such
- as stealing users' photos instead of “beautifying” them, <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
- unwanted and often malicious ads on users, and redirecting them
- to phishing sites</a> that stole their credentials. Furthermore, the
- user interface of most of them was designed to make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
- </li>
</ul></em></ins></span>
@@ -324,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.de.po 28 Feb 2019 09:00:39 -0000 1.94
+++ proprietary.de.po 28 Feb 2019 09:30:39 -0000 1.95
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -507,26 +522,6 @@
"of anyone who operates the touch screen?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.es.po 28 Feb 2019 09:00:39 -0000 1.107
+++ proprietary.es.po 28 Feb 2019 09:30:39 -0000 1.108
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2019-02-25 11:08+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -413,40 +428,6 @@
"huella dactilar en la pantalla</a>. ¿Supone esto que podrÃan registrar la "
"huella dactilar de cualquiera que opere en la pantalla táctil?"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-"Ventinueve aplicaciones de retoque de fotos <cite>(beauty camera apps)</"
-"cite> que solÃan estar en Google Play tenÃan una o más funcionalidades "
-"maliciosas, tales como robar las fotos de los usuarios en lugar de "
-"«embellecerlas», <a href=\"https://www.teleanalysis.com/news/national/"
-"these-29-beauty-camera-apps-steal-private-photo-29923\">enviar a los "
-"usuarios anuncios no deseados y a menudo maliciosos, y redirigirlos a webs "
-"que suplantan otra identidad</a> para asà robar sus credenciales. Además,
la "
-"interfaz de usuario de la mayorÃa de ellas está diseñada para dificultar
su "
-"desinstalación."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-"Por supuesto, los usuarios deberÃan desinstalar estas peligrosas "
-"aplicaciones si no lo han hecho ya, pero deberÃan también mantenerse "
-"alejados de las aplicaciones que no sean libres en general. <em>Todas</em> "
-"las aplicaciones que no son libres entrañan un riesgo potencial, ya que no "
-"es fácil saber qué hacen realmente."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -526,6 +507,38 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Twenty nine “beauty camera” apps that used to be on Google "
+#~ "Play had one or more malicious functionalities, such as stealing users' "
+#~ "photos instead of “beautifying” them, <a href=\"https://www."
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">pushing unwanted and often malicious ads on users, and "
+#~ "redirecting them to phishing sites</a> that stole their credentials. "
+#~ "Furthermore, the user interface of most of them was designed to make "
+#~ "uninstallation difficult."
+#~ msgstr ""
+#~ "Ventinueve aplicaciones de retoque de fotos <cite>(beauty camera apps)</"
+#~ "cite> que solÃan estar en Google Play tenÃan una o más funcionalidades "
+#~ "maliciosas, tales como robar las fotos de los usuarios en lugar de "
+#~ "«embellecerlas», <a href=\"https://www.teleanalysis.com/news/national/"
+#~ "these-29-beauty-camera-apps-steal-private-photo-29923\">enviar a los "
+#~ "usuarios anuncios no deseados y a menudo maliciosos, y redirigirlos a "
+#~ "webs que suplantan otra identidad</a> para asà robar sus credenciales. "
+#~ "Además, la interfaz de usuario de la mayorÃa de ellas está diseñada
para "
+#~ "dificultar su desinstalación."
+
+#~ msgid ""
+#~ "Users should of course uninstall these dangerous apps if they haven't "
+#~ "yet, but they should also stay away from nonfree apps in general. "
+#~ "<em>All</em> nonfree apps carry a potential risk because there is no easy "
+#~ "way of knowing what they really do."
+#~ msgstr ""
+#~ "Por supuesto, los usuarios deberÃan desinstalar estas peligrosas "
+#~ "aplicaciones si no lo han hecho ya, pero deberÃan también mantenerse "
+#~ "alejados de las aplicaciones que no sean libres en general. <em>Todas</"
+#~ "em> las aplicaciones que no son libres entrañan un riesgo potencial, ya "
+#~ "que no es fácil saber qué hacen realmente."
+
+#~ msgid ""
#~ "Many nonfree apps have a surveillance feature for <a href=\"https://"
#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
#~ "all the users' actions</a> in interacting with the app."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary.fr.po 28 Feb 2019 09:00:39 -0000 1.131
+++ proprietary.fr.po 28 Feb 2019 09:30:39 -0000 1.132
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2019-02-23 20:39+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -295,6 +295,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -410,40 +425,6 @@
"Cela signifie-t-il qu'ils pourraient prendre l'empreinte digitale de toute "
"personne se servant de l'écran tactile?"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-"Vingt-neuf applis d'amélioration de photos <cite>[beauty camera apps]</cite>
"
-"qui se trouvaient sur Google Play avaient une ou plusieurs fonctionnalités "
-"malveillantes, parmi lesquelles le vol des photos, tandis qu'aucune "
-"amélioration n'était effectuée, <a
href=\"https://www.teleanalysis.com/news/"
-"national/these-29-beauty-camera-apps-steal-private-photo-29923\">l'envoi de "
-"pubs non désirées et souvent malveillantes aux utilisateurs et la "
-"redirection vers des sites de phishing</a> qui volaient leurs données "
-"personnelles. De plus, l'interface utilisateurs de la plupart d'entre elles "
-"était conçue de telle sorte qu'elles soient difficiles à désinstaller."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-"Bien entendu, les utilisateurs doivent désinstaller ces applis dangereuses "
-"s'ils ne l'ont déjà fait, mais plus généralement ils doivent éviter les "
-"applis non libres. <em>Toutes</em> les applis non libres comportent un "
-"risque potentiel parce qu'on ne peut pas vérifier facilement ce qu'elles "
-"font en réalité."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -519,6 +500,39 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Twenty nine “beauty camera” apps that used to be on Google "
+#~ "Play had one or more malicious functionalities, such as stealing users' "
+#~ "photos instead of “beautifying” them, <a href=\"https://www."
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">pushing unwanted and often malicious ads on users, and "
+#~ "redirecting them to phishing sites</a> that stole their credentials. "
+#~ "Furthermore, the user interface of most of them was designed to make "
+#~ "uninstallation difficult."
+#~ msgstr ""
+#~ "Vingt-neuf applis d'amélioration de photos <cite>[beauty camera apps]</"
+#~ "cite> qui se trouvaient sur Google Play avaient une ou plusieurs "
+#~ "fonctionnalités malveillantes, parmi lesquelles le vol des photos, tandis
"
+#~ "qu'aucune amélioration n'était effectuée, <a href=\"https://www."
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">l'envoi de pubs non désirées et souvent malveillantes aux "
+#~ "utilisateurs et la redirection vers des sites de phishing</a> qui "
+#~ "volaient leurs données personnelles. De plus, l'interface utilisateurs de
"
+#~ "la plupart d'entre elles était conçue de telle sorte qu'elles soient "
+#~ "difficiles à désinstaller."
+
+#~ msgid ""
+#~ "Users should of course uninstall these dangerous apps if they haven't "
+#~ "yet, but they should also stay away from nonfree apps in general. "
+#~ "<em>All</em> nonfree apps carry a potential risk because there is no easy "
+#~ "way of knowing what they really do."
+#~ msgstr ""
+#~ "Bien entendu, les utilisateurs doivent désinstaller ces applis "
+#~ "dangereuses s'ils ne l'ont déjà fait, mais plus généralement ils
doivent "
+#~ "éviter les applis non libres. <em>Toutes</em> les applis non libres "
+#~ "comportent un risque potentiel parce qu'on ne peut pas vérifier "
+#~ "facilement ce qu'elles font en réalité."
+
+#~ msgid ""
#~ "Many nonfree apps have a surveillance feature for <a href=\"https://"
#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
#~ "all the users' actions</a> in interacting with the app."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.it-diff.html 28 Feb 2019 09:00:39 -0000 1.64
+++ proprietary.it-diff.html 28 Feb 2019 09:30:39 -0000 1.65
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -247,22 +259,6 @@
fingerprint sensors in the display</a>. Does that imply they could
take the fingerprint of anyone who operates the touch screen?</p>
</li>
-
- <li id="M201902041">
- <p>Twenty nine “beauty camera” apps that used to be
- on Google Play had one or more malicious functionalities, such
- as stealing users' photos instead of “beautifying” them, <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
- unwanted and often malicious ads on users, and redirecting them
- to phishing sites</a> that stole their credentials. Furthermore, the
- user interface of most of them was designed to make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
- </li>
</ul></em></ins></span>
@@ -323,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary.it.po 28 Feb 2019 09:00:39 -0000 1.103
+++ proprietary.it.po 28 Feb 2019 09:30:39 -0000 1.104
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -511,26 +526,6 @@
"of anyone who operates the touch screen?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.ja-diff.html 28 Feb 2019 09:00:39 -0000 1.65
+++ proprietary.ja-diff.html 28 Feb 2019 09:30:39 -0000 1.66
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -181,6 +181,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -244,22 +256,6 @@
fingerprint sensors in the display</a>. Does that imply they could
take the fingerprint of anyone who operates the touch screen?</p>
</li>
-
- <li id="M201902041">
- <p>Twenty nine “beauty camera” apps that used to be
- on Google Play had one or more malicious functionalities, such
- as stealing users' photos instead of “beautifying” them, <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
- unwanted and often malicious ads on users, and redirecting them
- to phishing sites</a> that stole their credentials. Furthermore, the
- user interface of most of them was designed to make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
- </li>
</ul></em></ins></span>
@@ -320,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.ja.po 28 Feb 2019 09:00:39 -0000 1.86
+++ proprietary.ja.po 28 Feb 2019 09:30:39 -0000 1.87
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -431,26 +446,6 @@
"of anyone who operates the touch screen?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.nl-diff.html 28 Feb 2019 09:00:39 -0000 1.64
+++ proprietary.nl-diff.html 28 Feb 2019 09:30:39 -0000 1.65
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -247,22 +259,6 @@
fingerprint sensors in the display</a>. Does that imply they could
take the fingerprint of anyone who operates the touch screen?</p>
</li>
-
- <li id="M201902041">
- <p>Twenty nine “beauty camera” apps that used to be
- on Google Play had one or more malicious functionalities, such
- as stealing users' photos instead of “beautifying” them, <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
- unwanted and often malicious ads on users, and redirecting them
- to phishing sites</a> that stole their credentials. Furthermore, the
- user interface of most of them was designed to make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
- </li>
</ul></em></ins></span>
@@ -323,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary.nl.po 28 Feb 2019 09:00:39 -0000 1.75
+++ proprietary.nl.po 28 Feb 2019 09:30:39 -0000 1.76
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -504,26 +519,6 @@
"of anyone who operates the touch screen?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.pl-diff.html 28 Feb 2019 09:00:39 -0000 1.82
+++ proprietary.pl-diff.html 28 Feb 2019 09:30:39 -0000 1.83
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -245,22 +257,6 @@
fingerprint sensors in the display</a>. Does that imply they could
take the fingerprint of anyone who operates the touch screen?</p>
</li>
-
- <li id="M201902041">
- <p>Twenty nine “beauty camera” apps that used to be
- on Google Play had one or more malicious functionalities, such
- as stealing users' photos instead of “beautifying” them, <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
- unwanted and often malicious ads on users, and redirecting them
- to phishing sites</a> that stole their credentials. Furthermore, the
- user interface of most of them was designed to make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
- </li>
</ul></em></ins></span>
@@ -321,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary.pl.po 28 Feb 2019 09:00:39 -0000 1.70
+++ proprietary.pl.po 28 Feb 2019 09:30:39 -0000 1.71
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -586,26 +601,6 @@
"of anyone who operates the touch screen?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.pot 28 Feb 2019 09:00:39 -0000 1.67
+++ proprietary.pot 28 Feb 2019 09:30:40 -0000 1.68
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a "
+"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\"> "
+"sent personal data to Facebook</a>. Lots of companies built apps that way "
+"and released them, apparently not realizing that all the personal data they "
+"collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -319,25 +335,6 @@
"fingerprint of anyone who operates the touch screen?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a "
-"href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\">pushing
"
-"unwanted and often malicious ads on users, and redirecting them to phishing "
-"sites</a> that stole their credentials. Furthermore, the user interface of "
-"most of them was designed to make uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.pt-br.po 28 Feb 2019 09:00:39 -0000 1.96
+++ proprietary.pt-br.po 28 Feb 2019 09:30:40 -0000 1.97
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2019-02-24 15:49-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -404,39 +419,6 @@
"impressão digital na tela</a>. Isso significa que eles poderia coletar a "
"impressão digital de qualquer um que opera a tela de toque?"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-"Vinte e nove aplicativos de âcâmera de belezaâ que costumavam estar no "
-"Google Play tinham uma ou mais funcionalidades maliciosas, como roubar fotos "
-"dos usuários em vez de âembelezá-lasâ, <a
href=\"https://www.teleanalysis."
-"com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\"> "
-"empurrando anúncios indesejados e muitas vezes maliciosos para os usuários,
"
-"e redirecionando-os para sites de phishing</a> que roubaram suas "
-"credenciais. Além disso, a interface do usuário da maioria deles foi "
-"projetada para dificultar a desinstalação."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-"Os usuários devem, é claro, desinstalar esses aplicativos perigosos se
ainda "
-"não o fizeram, mas eles também devem ficar longe de aplicativos não livres
"
-"em geral. <em>Todos</em> os aplicativos não livres apresentam um risco "
-"potencial, porque não há uma maneira fácil de saber o que eles realmente "
-"fazem."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,6 +494,37 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Twenty nine “beauty camera” apps that used to be on Google "
+#~ "Play had one or more malicious functionalities, such as stealing users' "
+#~ "photos instead of “beautifying” them, <a href=\"https://www."
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">pushing unwanted and often malicious ads on users, and "
+#~ "redirecting them to phishing sites</a> that stole their credentials. "
+#~ "Furthermore, the user interface of most of them was designed to make "
+#~ "uninstallation difficult."
+#~ msgstr ""
+#~ "Vinte e nove aplicativos de âcâmera de belezaâ que costumavam estar
no "
+#~ "Google Play tinham uma ou mais funcionalidades maliciosas, como roubar "
+#~ "fotos dos usuários em vez de âembelezá-lasâ, <a href=\"https://www."
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\"> empurrando anúncios indesejados e muitas vezes maliciosos "
+#~ "para os usuários, e redirecionando-os para sites de phishing</a> que "
+#~ "roubaram suas credenciais. Além disso, a interface do usuário da maioria
"
+#~ "deles foi projetada para dificultar a desinstalação."
+
+#~ msgid ""
+#~ "Users should of course uninstall these dangerous apps if they haven't "
+#~ "yet, but they should also stay away from nonfree apps in general. "
+#~ "<em>All</em> nonfree apps carry a potential risk because there is no easy "
+#~ "way of knowing what they really do."
+#~ msgstr ""
+#~ "Os usuários devem, é claro, desinstalar esses aplicativos perigosos se "
+#~ "ainda não o fizeram, mas eles também devem ficar longe de aplicativos
não "
+#~ "livres em geral. <em>Todos</em> os aplicativos não livres apresentam um "
+#~ "risco potencial, porque não há uma maneira fácil de saber o que eles "
+#~ "realmente fazem."
+
+#~ msgid ""
#~ "Many nonfree apps have a surveillance feature for <a href=\"https://"
#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
#~ "all the users' actions</a> in interacting with the app."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary.ru.po 28 Feb 2019 09:00:39 -0000 1.163
+++ proprietary.ru.po 28 Feb 2019 09:30:40 -0000 1.164
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -299,6 +299,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -411,40 +426,6 @@
"даÑÑики оÑпеÑаÑков палÑÑев на ÑкÑане</a>.
ÐодÑазÑÐ¼ÐµÐ²Ð°ÐµÑ Ð»Ð¸ ÑÑо, ÑÑо они "
"могли Ð±Ñ ÑнимаÑÑ Ð¾ÑпеÑаÑки вÑеÑ
, кÑо
ÑабоÑÐ°ÐµÑ Ñ ÑенÑоÑнÑм ÑкÑаном?"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-"РдвадÑаÑи девÑÑи пÑиложениÑÑ
“ÑоÑоÑеÑÑÑиÑованиє, коÑоÑÑе бÑли "
-"когда-Ñо на Google Play, имелиÑÑ Ð²ÑедоноÑнÑе
ÑÑнкÑии, Ñакие как кÑажа "
-"ÑоÑогÑаÑий полÑзоваÑÐµÐ»Ñ Ð²Ð¼ÐµÑÑо
“пÑиÑкÑаÑиваниє иÑ
, <a href="
-"\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-"
-"steal-private-photo-29923\">навÑзÑвание нежелаÑелÑной
и ÑаÑÑо вÑедной "
-"ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¿Ð¾Ð»ÑзоваÑелÑм, а Ñакже
пеÑенапÑавление иÑ
на моÑенниÑеÑкие
ÑайÑÑ</"
-"a>, на коÑоÑÑÑ
Ñ Ð½Ð¸Ñ
воÑовали
ÑдоÑÑовеÑÑÑÑÑÑ Ð»Ð¸ÑноÑÑÑ Ð¸Ð½ÑоÑмаÑиÑ. Ðолее "
-"Ñого, полÑзоваÑелÑÑкий инÑеÑÑÐµÐ¹Ñ Ð±Ð¾Ð»ÑÑей
иÑ
ÑаÑÑи бÑл ÑпÑоекÑиÑован, ÑÑÐ¾Ð±Ñ "
-"пÑиложение бÑло ÑÑÑдно ÑдалиÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-"ÐонеÑно, полÑзоваÑелÑм ÑледÑÐµÑ ÑдалиÑÑ
ÑÑи опаÑнÑе пÑиложениÑ, еÑли они еÑе "
-"ÑÑого не Ñделали, но им ÑледÑÐµÑ Ñакже
вообÑе обÑ
одиÑÑ ÑÑоÑоной неÑвободнÑе "
-"пÑиложениÑ. <em>ÐÑе</em> неÑвободнÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑопÑÑÐ¶ÐµÐ½Ñ Ñ Ð¿Ð¾ÑенÑиалÑнÑм "
-"ÑиÑком, поÑÐ¾Ð¼Ñ ÑÑо Ð½ÐµÑ Ð¿ÑоÑÑого ÑпоÑоба
ÑзнаÑÑ, ÑÑо они в дейÑÑвиÑелÑноÑÑи "
-"делаÑÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -524,6 +505,38 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Twenty nine “beauty camera” apps that used to be on Google "
+#~ "Play had one or more malicious functionalities, such as stealing users' "
+#~ "photos instead of “beautifying” them, <a href=\"https://www."
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">pushing unwanted and often malicious ads on users, and "
+#~ "redirecting them to phishing sites</a> that stole their credentials. "
+#~ "Furthermore, the user interface of most of them was designed to make "
+#~ "uninstallation difficult."
+#~ msgstr ""
+#~ "РдвадÑаÑи девÑÑи пÑиложениÑÑ
“ÑоÑоÑеÑÑÑиÑованиє, коÑоÑÑе "
+#~ "бÑли когда-Ñо на Google Play, имелиÑÑ
вÑедоноÑнÑе ÑÑнкÑии, Ñакие как "
+#~ "кÑажа ÑоÑогÑаÑий полÑзоваÑÐµÐ»Ñ Ð²Ð¼ÐµÑÑо
“пÑиÑкÑаÑиваниє иÑ
, <a "
+#~ "href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-"
+#~ "apps-steal-private-photo-29923\">навÑзÑвание
нежелаÑелÑной и ÑаÑÑо "
+#~ "вÑедной ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¿Ð¾Ð»ÑзоваÑелÑм, а Ñакже
пеÑенапÑавление иÑ
на "
+#~ "моÑенниÑеÑкие ÑайÑÑ</a>, на коÑоÑÑÑ
Ñ Ð½Ð¸Ñ
воÑовали ÑдоÑÑовеÑÑÑÑÑÑ "
+#~ "лиÑноÑÑÑ Ð¸Ð½ÑоÑмаÑиÑ. Ðолее Ñого,
полÑзоваÑелÑÑкий инÑеÑÑÐµÐ¹Ñ Ð±Ð¾Ð»ÑÑей иÑ
"
+#~ "ÑаÑÑи бÑл ÑпÑоекÑиÑован, ÑÑобÑ
пÑиложение бÑло ÑÑÑдно ÑдалиÑÑ."
+
+#~ msgid ""
+#~ "Users should of course uninstall these dangerous apps if they haven't "
+#~ "yet, but they should also stay away from nonfree apps in general. "
+#~ "<em>All</em> nonfree apps carry a potential risk because there is no easy "
+#~ "way of knowing what they really do."
+#~ msgstr ""
+#~ "ÐонеÑно, полÑзоваÑелÑм ÑледÑÐµÑ ÑдалиÑÑ
ÑÑи опаÑнÑе пÑиложениÑ, еÑли они "
+#~ "еÑе ÑÑого не Ñделали, но им ÑледÑÐµÑ Ñакже
вообÑе обÑ
одиÑÑ ÑÑоÑоной "
+#~ "неÑвободнÑе пÑиложениÑ. <em>ÐÑе</em>
неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑопÑÑÐ¶ÐµÐ½Ñ Ñ "
+#~ "поÑенÑиалÑнÑм ÑиÑком, поÑÐ¾Ð¼Ñ ÑÑо неÑ
пÑоÑÑого ÑпоÑоба ÑзнаÑÑ, ÑÑо они в "
+#~ "дейÑÑвиÑелÑноÑÑи делаÑÑ."
+
+#~ msgid ""
#~ "Many nonfree apps have a surveillance feature for <a href=\"https://"
#~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
#~ "all the users' actions</a> in interacting with the app."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary.zh-tw-diff.html 28 Feb 2019 09:00:39 -0000 1.42
+++ proprietary.zh-tw-diff.html 28 Feb 2019 09:30:40 -0000 1.43
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -125,17 +125,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
-<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
<li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
@@ -248,22 +260,6 @@
fingerprint sensors in the display</a>. Does that imply they could
take the fingerprint of anyone who operates the touch screen?</p>
</li>
-
- <li id="M201902041">
- <p>Twenty nine “beauty camera” apps that used to be
- on Google Play had one or more malicious functionalities, such
- as stealing users' photos instead of “beautifying” them, <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
- unwanted and often malicious ads on users, and redirecting them
- to phishing sites</a> that stole their credentials. Furthermore, the
- user interface of most of them was designed to make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
- </li>
</ul></em></ins></span>
@@ -324,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary.zh-tw.po 28 Feb 2019 09:00:39 -0000 1.53
+++ proprietary.zh-tw.po 28 Feb 2019 09:30:40 -0000 1.54
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
@@ -420,26 +435,6 @@
"of anyone who operates the touch screen?"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine “beauty camera” apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of “beautifying” them, <a href=\"https://www."
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- pt-br.po 28 Feb 2019 09:00:39 -0000 1.51
+++ pt-br.po 28 Feb 2019 09:30:40 -0000 1.52
@@ -4134,6 +4134,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- ru.po 28 Feb 2019 09:00:40 -0000 1.83
+++ ru.po 28 Feb 2019 09:30:40 -0000 1.84
@@ -5710,6 +5710,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- zh-tw.po 28 Feb 2019 09:00:40 -0000 1.37
+++ zh-tw.po 28 Feb 2019 09:30:40 -0000 1.38
@@ -3970,6 +3970,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., (continued)
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/24
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28