[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www graphics/graphics.es.html graphics/philosop...
From: |
GNUN |
Subject: |
www graphics/graphics.es.html graphics/philosop... |
Date: |
Wed, 13 Mar 2019 07:01:02 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/03/13 07:01:00
Modified files:
graphics : graphics.es.html philosophicalgnu.es.html
reiss-gnuhead.es.html usegnu.es.html
graphics/po : graphics.es-en.html philosophicalgnu.es-en.html
reiss-gnuhead.es-en.html usegnu.es-en.html
proprietary/po : de.po es.po fr.po it.po ja.po
malware-cars.de-diff.html malware-cars.de.po
malware-cars.fr.po malware-cars.pot
malware-cars.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/graphics.es.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/philosophicalgnu.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/reiss-gnuhead.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/usegnu.es.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/graphics.es-en.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/philosophicalgnu.es-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/reiss-gnuhead.es-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/usegnu.es-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.390&r2=1.391
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.487&r2=1.488
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.48&r2=1.49
Patches:
Index: graphics/graphics.es.html
===================================================================
RCS file: /web/www/www/graphics/graphics.es.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- graphics/graphics.es.html 15 Dec 2018 14:46:11 -0000 1.70
+++ graphics/graphics.es.html 13 Mar 2019 11:00:58 -0000 1.71
@@ -37,16 +37,11 @@
tr {
display: inline-block;
width: 18.5em;
- margin: .5em 0;
}
table td {
- padding: 0;
+ padding: 0 .5em;
border: none;
}
-table img {
- margin-right: 1em;
-}
-
@media (min-width: 22em) {
table {
width: 20.5em;
@@ -255,7 +250,7 @@
<tr><td><a href="/graphics/arantxa.html">
<img src="/graphics/icons/arantxa-glitch.80.png"
alt=" [Glitch] " /></a></td>
- <td>Julio de 2018: Diseños GNU<br />
+ <td>Julio de 2018: Diseños GNU luminosos<br />
<small>de Arantxa Serantes</small></td></tr>
<!--#endif
-->
@@ -329,8 +324,8 @@
&& $TYPE = /^$/" -->
<tr><td><a href="/graphics/3dgnuhead.html">
<img src="/graphics/icons/3dgnuhead.80.png"
- alt=" [3D GNU Head] " /></a></td>
- <td>Cabeza GNU en 3D<br />
+ alt=" [Retrato de GNU] " /></a></td>
+ <td>Retrato de GNU<br />
<small>de Dale Mellor</small></td></tr>
<!--#endif
-->
@@ -338,13 +333,13 @@
&& $TYPE = /^$/" -->
<tr><td><a href="/graphics/agnubody.html">
<img src="/graphics/icons/agnubody.80.png"
- alt=" [A GNU Body] " /></a></td>
+ alt=" [Un GNU con cuerpo] " /></a></td>
<td>Un cuerpo Gnu<br />
<small>de Graham Wilson</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
- && $TYPE = /^$/" -->
+ && $TYPE = /^(svg|ascii|logo|)$/" -->
<tr><td><a href="/graphics/agnuhead.html">
<img src="/graphics/icons/gnu-head.80.png"
alt=" [Image of the head of a GNU] " /></a></td>
@@ -354,11 +349,11 @@
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
- && $TYPE = /^(ascii|)$/" -->
+ && $TYPE = /^(ascii|logo|)$/" -->
<tr><td><a href="/graphics/agnuheadterm.html">
<img src="/graphics/icons/agnuheadterm.80.png"
- alt=" [GNU Head] " /></a></td>
- <td>Una cabeza GNU para terminales<br />
+ alt=" [Cabeza de GNU para terminal] " /></a></td>
+ <td>Una cabeza GNU en terminales<br />
<small>de Mattias Andrée</small></td></tr>
<!--#endif
-->
@@ -366,17 +361,17 @@
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/ahurdlogo.html">
<img src="/graphics/icons/hurd-logo.80.png"
- alt=" [image of a Spherical Hurd Logo] " /></a></td>
- <td>Logos de Hurd<br />
- <small>de Teddy Hogeborn y Stephen McCamant,
respectivamente</small></td></tr>
+ alt=" [Logo de Hurd esférico] " /></a></td>
+ <td>Logo de Hurd esférico<br />
+ <small>de Teddy Hogeborn</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/anfsflogo.html">
- <img src="/graphics/icons/fsf-logo.80.png"
- alt=" [image of an FSF Logo on black] " /></a></td>
- <td>Un logo de la FSF<br />
+ <img src="/graphics/icons/fsf-bk.80.png"
+ alt=" [Logo de la FSF en negro] " /></a></td>
+ <td>Logos de la FSF<br />
<small>de Shawn Ewald</small></td></tr>
<!--#endif
-->
@@ -384,26 +379,26 @@
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/anlpflogo.html">
<img src="/graphics/icons/liberty.80.png"
- alt=" [image of the Statue of Liberty Protecting Software
Freedoms] " /></a></td>
+ alt=" [Estatua de la libertad protegiendo las libertades del
software] " /></a></td>
<td>Un logo de LPF<br />
<small>de Etienne Suvasa</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|)$/
- && $TYPE = /^(badge|)$/" -->
+ && $TYPE = /^(svg|banner|logo|)$/" -->
<tr><td><a href="/graphics/atypinggnu.html">
<img src="/graphics/icons/gnu-type.80.png"
- alt=" [image of a Typing GNU Hacker] " /></a></td>
- <td>Un hacker Gnu tecleando<br />
+ alt=" [Hacker GNU tecleando] " /></a></td>
+ <td>Un hacker GNU tecleando<br />
<small>de Jamal Hannah</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|)$/
- && $TYPE = /^(badge|)$/" -->
+ && $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/anothertypinggnu.html">
<img src="/graphics/icons/another-gnu-type.80.png"
- alt=" [image of Another GNU Hacker] " /></a></td>
- <td>Otro hacker Gnu tecleando<br />
+ alt=" [Otro hacker GNU tecleando] " /></a></td>
+ <td>Otro hacker GNU tecleando<br />
<small>de Peter McLachlan</small></td></tr>
<!--#endif
-->
@@ -412,16 +407,16 @@
<tr><td><a href="/graphics/arantxa.html">
<img src="/graphics/icons/arantxa-glitch.80.png"
alt=" [Glitch] " /></a></td>
- <td>Diseños GNU<br />
+ <td>Diseños GNU luminosos<br />
<small>de Arantxa Serantes</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|)$/
- && $TYPE = /^$/" -->
+ && $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/babygnu.html">
<img src="/graphics/icons/baby-gnu.80.png"
- alt=" [image of a Baby GNU] " /></a></td>
- <td>Bebé Gnu<br />
+ alt=" [Bebé GNU chupándose el pulgar] " /></a></td>
+ <td>Bebé GNU<br />
<small>de Etienne Suvasa</small></td></tr>
<!--#endif
-->
@@ -438,7 +433,7 @@
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/bokma-gnu.html">
<img src="/graphics/icons/bokma-gnu.80.png"
- alt=" [image of a GNU] " /></a></td>
+ alt=" [GNU logo] " /></a></td>
<td>Logos de GNU y Emacs<br />
<small>de John Bokma</small></td></tr>
<!--#endif
@@ -447,7 +442,7 @@
&& $TYPE = /^(svg|)$/" -->
<tr><td><a href="/graphics/bold-initiative-GNU-head.html">
<img src="/graphics/icons/bold-initiative-GNU-head.80.png"
- alt=" [Bold Initiative GNU Head] " /></a></td>
+ alt=" [Cabeza de GNU guiñando un ojo] " /></a></td>
<td>GNU guiñando<br />
<small>de Bravo Edison</small></td></tr>
<!--#endif
@@ -457,16 +452,17 @@
<tr><td><a href="/graphics/BVBN.html">
<img src="/graphics/icons/bvbn-logo-small.80.png"
alt=" [GNU Head logo] " /></a></td>
- <td>Dibujos GNU útiles<br />
+ <td>Teclas GNU/Linux<br />
<small>de Vladimir Tsarkov</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|tux|)$/
&& $TYPE = /^(poster|)$/" -->
<tr><td><a href="/graphics/bwcartoon.html">
- <img src="/graphics/icons/bwcartoon.80.png"
- alt=" [B & W Cartoon] " /></a></td>
- <td>El dúo dinámico: El Gnu y el pinguino volando</td></tr>
+ <img src="/graphics/icons/gnu-and-penguin-color.80.png"
+ alt=" [El Gnu y el pinguino volando] " /></a></td>
+ <td>El dúo dinámico: El Gnu y el pinguino volando<br />
+ <small>de un artista anónimo</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(license|)$/
@@ -482,8 +478,8 @@
&& $TYPE = /^(banner|svg|)$/" -->
<tr><td><a href="/graphics/digital-restrictions-management.html">
<img src="/graphics/icons/ichain.80.png"
- alt=" [iChains] " /></a></td>
- <td>Gestión Digital de Restricciones<br />
+ alt=" [Las cadenas de la Gestión de Restricciones
Digitales] " /></a></td>
+ <td>Arte GNU: Gestión de Restricciones Digitales<br />
<small>de Chris Hayes</small></td></tr>
<!--#endif
-->
@@ -495,6 +491,15 @@
<td>Logo de Dragora<br /></td></tr>
<!--#endif
-->
+<!--#if expr="$THEME = /^(gnu|)$/
+ && $TYPE = /^(wallpaper|)$/" -->
+<tr><td><a href="/graphics/dittberner-gnu.html">
+ <img src="/graphics/icons/dittberner_gnu.80.png"
+ alt=" [gnu a la carrera] " /></a></td>
+ <td>Gnu a la carrera<br />
+ <small>de Dorothea y Jan Dittberner</small></td></tr>
+<!--#endif
+-->
<!--#if expr="$THEME = /^(surveillance|)$/
&& $TYPE = /^(cartoon|)$/" -->
<tr><td><a href="/graphics/dog.html">
@@ -509,7 +514,7 @@
<tr><td><a href="/graphics/emacs-ref.html">
<img src="/graphics/icons/emacs-ref.80.png"
alt=" [Reference card with GNU face] " /></a></td>
- <td>Fondo de pantalla guÃa de GNU Emacs<br />
+ <td>Hoja de referencia de GNU Emacs<br />
<small>de Loic Duros</small></td></tr>
<!--#endif
-->
@@ -517,7 +522,7 @@
&& $TYPE = /^(poster|svg|wallpaper|)$/" -->
<tr><td><a href="/graphics/flying-gnu.html">
<img src="/graphics/icons/flying-gnu.80.png"
- alt=" [Flying GNU Design] " /></a></td>
+ alt=" [Diseño de GNU volando] " /></a></td>
<td>Gnu volante<br />
<small>de Ernesto Bazzano</small></td></tr>
<!--#endif
@@ -547,15 +552,15 @@
alt=" [Gnu and Tux as messengers of free software in the
desolate land of
proprietary software] " /></a></td>
<td>Mensajeros del software libre<br />
- <small>de Péhä</small></td></tr>
+ <small>de Péhä</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(wallpaper|)$/" -->
<tr><td><a href="/graphics/free-your-soul.html">
<img src="/graphics/icons/free-your-soul-wallpaper.80.png"
- alt=" [ Free Your Soul Wallpaper ] " /></a></td>
- <td>Libera tu alma<br />
+ alt=" [Fondo de pantalla Libera tu alma] " /></a></td>
+ <td>Fondo de pantalla Libera tu alma<br />
<small>de Sayem Chaklader</small></td></tr>
<!--#endif
-->
@@ -564,12 +569,12 @@
<tr><td><a href="/graphics/french-motto.html">
<img src="/graphics/icons/LEF.fr.80.png"
alt=" [liberty, equality, brotherhood button] " /></a></td>
- <td>Lema francés<br />
- <small>de Lutz Bürger</small></td></tr>
+ <td>Tecla con lema francés<br />
+ <small>de Lutz Bürger</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
- && $TYPE = /^$/" -->
+ && $TYPE = /^(button|)$/" -->
<tr><td><a href="/graphics/fromagnulinux.html">
<img src="/graphics/icons/fromagnulinux.80.png"
alt=" [Fromagnulinux] " /></a></td>
@@ -581,7 +586,7 @@
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/fsf-logo.html">
<img src="/graphics/icons/fsf-logo-notext.80.png"
- alt=" [The Official FSF Logo] " /></a></td>
+ alt=" [El logo oficial de la FSF] " /></a></td>
<td>Logo de la Free Software Foundation<br />
<small>de Li Jiang</small></td></tr>
<!--#endif
@@ -592,7 +597,8 @@
<img src="/graphics/icons/FSFS-title2.80.png"
alt=" [The book cover logo for 'Free Software, Free
Society'] " /></a></td>
<td>Logotipo de la portada del libro <i>Software libre para una sociedad
-libre</i></td></tr>
+libre</i><br />
+ <small>de Jonathan Richard</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
@@ -608,7 +614,7 @@
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/gleesons.html">
<img src="/graphics/icons/gleeson_head.80.png"
- alt=" [colorful rounded image of the Head of a GNU] "
/></a></td>
+ alt=" [Colorful rounded image of the head of a GNU] "
/></a></td>
<td>Arte GNU<br />
<small>de Brendon Gleeson</small></td></tr>
<!--#endif
@@ -631,26 +637,28 @@
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
- && $TYPE = /^(wallpaper|)$/" -->
+ && $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/gnu-alternative.html">
<img src="/graphics/icons/gnu-alternative.80.png"
- alt=" [image of the Head of a GNU] " /></a></td>
- <td>Cabeza GNU alternativa</td></tr>
+ alt=" [Stylized gnu mask] " /></a></td>
+ <td>GNU alternativo<br />
+ <small>de un artista anónimo</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(ascii|)$/" -->
<tr><td><a href="/graphics/gnu-ascii.html">
<img src="/graphics/icons/gnu-ascii.80.png"
- alt=" [ASCII Gnu] " /></a></td>
- <td>Un GNU en ASCII</td></tr>
+ alt=" [ASCII Gnu head] " /></a></td>
+ <td>GNU en ASCII<br />
+ <small>de Przemysław Borys</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(ascii|button|icon|)$/" -->
<tr><td><a href="/graphics/gnu-ascii2.html">
<img src="/graphics/icons/gnu-ascii2.80.png"
- alt=" [ASCII Gnu] " /></a></td>
+ alt=" [Small ASCII Gnu head] " /></a></td>
<td>Otro GNU en ASCII (para firmas de email)<br />
<small>de Martin Dickopp</small></td></tr>
<!--#endif
@@ -660,7 +668,7 @@
<tr><td><a href="/graphics/gnu-ascii-liberty.html">
<img src="/graphics/icons/gnu-ascii-liberty.80.png"
alt=" [ASCII Gnu is liberty] " /></a></td>
- <td>Un “GNU is Liberty” en ASCII<br />
+ <td>»GNU is Liberty» en ASCII<br />
<small>de Carlos Contreras A.</small></td></tr>
<!--#endif
-->
@@ -668,7 +676,7 @@
&& $TYPE = /^(badge|wallpaper|)$/" -->
<tr><td><a href="/graphics/gnu-born-free-run-free.html">
<img src="/graphics/icons/gnu-born-free-run-free.80.png"
- alt=" [A gnu running] " /></a></td>
+ alt=" [GNU Born Free Runs Free] " /></a></td>
<td>GNU Born Free Runs Free<br />
<small>de Alicia Lapekas</small></td></tr>
<!--#endif
@@ -678,7 +686,7 @@
<tr><td><a href="/graphics/gnu-head-luk.html">
<img src="/graphics/icons/gnu-head-luk.80.png"
alt=" [Luk's GNU head] " /></a></td>
- <td>Cabeza GNU<br />
+ <td>Cabeza GNU estilizada<br />
<small>de Luk</small></td></tr>
<!--#endif
-->
@@ -687,7 +695,7 @@
<tr><td><a href="/graphics/gnu-head-shadow.html">
<img src="/graphics/icons/gnu_headshadow.80.png"
alt=" [GNU banner saying: run free run gnu] " /></a></td>
- <td>Una cabeza GNU en sombra<br />
+ <td>Cabeza GNU en sombra<br />
<small>de Vladimir Zúñiga</small></td></tr>
<!--#endif
-->
@@ -722,7 +730,7 @@
&& $TYPE = /^(wallpaper|)$/" -->
<tr><td><a href="/graphics/gnu-slash-linux.html">
<img src="/graphics/icons/gnu-linux-on-black.80.png"
- alt=" [GNU/Linux on black] " /></a></td>
+ alt=" [Gnu and Tux on black] " /></a></td>
<td>Ilustraciones GNU/Linux<br />
<small>de Rui Damas</small></td></tr>
<!--#endif
@@ -732,8 +740,8 @@
<tr><td><a href="/graphics/gnubanner.html">
<img src="/graphics/icons/gnubanner-2.80.png"
alt=" [Come and see what GNU creates for YOU] " /></a></td>
- <td>Anuncios GNU<br />
- <small>de Stefan Rieken, Lalo Martins y SpAwN,
respectivamente</small></td></tr>
+ <td>Anuncios GNU y enlace<br />
+ <small>de Stefan Rieken, John M. Wooten y SpAwN,
respectivamente</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnuhead|)$/
@@ -741,7 +749,7 @@
<tr><td><a href="/graphics/gnuhornedlogo.html">
<img src="/graphics/icons/gnu_hornedword.80.png"
alt=" [GNU Horned Word Logo] " /></a></td>
- <td>Un logo de GNU con cuernos<br />
+ <td>Logo de GNU con cuernos<br />
<small>de Vladimir Zúñiga</small></td></tr>
<!--#endif
-->
@@ -750,7 +758,7 @@
<tr><td><a href="/graphics/gnulove.html">
<img src="/graphics/icons/Gnulove.80.png"
alt=" [GNU Love] " /></a></td>
- <td>Un pingüino abrazando a un Gnu<br />
+ <td>Amor GNU<br />
<small>de Alison Upton</small></td></tr>
<!--#endif
-->
@@ -767,8 +775,8 @@
&& $TYPE = /^(badge|logo|)$/" -->
<tr><td><a href="/graphics/gnupascal.html">
<img src="/graphics/icons/Gnu+Pascal.80.png"
- alt=" [image of a Gnu and Blaise Pascal] " /></a></td>
- <td>Gnu y Blaise Pascal<br />
+ alt=" [A Gnu and Blaise Pascal] " /></a></td>
+ <td>GNU y Blaise Pascal<br />
<small>de Markus Gerwinski</small></td></tr>
<!--#endif
-->
@@ -785,8 +793,8 @@
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/groff-head.html">
<img src="/graphics/icons/groff-head.80.png"
- alt=" [image of the Head of a GNU with a printing press] "
/></a></td>
- <td>Cabeza de Groff<br />
+ alt=" [Head of a GNU with a printing press] " /></a></td>
+ <td>Cabeza de GNU con prensa de impresión<br />
<small>de Imogen Mulley</small></td></tr>
<!--#endif
-->
@@ -795,7 +803,7 @@
<tr><td><a href="/graphics/heckert_gnu.html">
<img src="/graphics/icons/heckert_gnu.80.png"
alt=" [Bold image of the head of a GNU] " /></a></td>
- <td>Cabeza GNU alternativa con contraste<br />
+ <td>Una cabeza GNU resaltada<br />
<small>de Aurelio A. Heckert</small></td></tr>
<!--#endif
-->
@@ -803,7 +811,7 @@
&& $TYPE = /^(wallpaper|)$/" -->
<tr><td><a href="/graphics/hitflip-gnu.html">
<img src="/graphics/icons/hitflip-gnu.80.png"
- alt=" [Hitflip 1 small] " /></a></td>
+ alt=" [GNU coin] " /></a></td>
<td>Moneda GNU y manada<br />
<small>de the Hitflip Team</small></td></tr>
<!--#endif
@@ -812,8 +820,8 @@
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/httptunnel-logo.html">
<img src="/graphics/icons/httptunnel-w.80.png"
- alt=" [httptunnel logo] " /></a></td>
- <td>Logo de HTTP-Tunnel<br />
+ alt=" [HTTPTunnel logo] " /></a></td>
+ <td>Logo de HTTPTunnel<br />
<small>de Harri Manni</small></td></tr>
<!--#endif
-->
@@ -821,7 +829,7 @@
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/hurd_mf.html">
<img src="/graphics/icons/hurd_mf.80.png"
- alt=" [small image of a Hurd Metafont Logo] " /></a></td>
+ alt=" [Hurd Metafont logo] " /></a></td>
<td>Logos de Hurd en Metafont<br />
<small>de Stephen McCamant</small></td></tr>
<!--#endif
@@ -875,7 +883,7 @@
&& $TYPE = /^(icon|)$/" -->
<tr><td><a href="/graphics/gnu-and-tux-icon.html">
<img src="/graphics/icons/gnu-and-tux-icon.80.png"
- alt=" [GNU and Tux] " /></a></td>
+ alt=" [Gnu and Tux icon] " /></a></td>
<td>Icono Gnu y Tux<br />
<small>de Sventsitskaya Nadezda</small></td></tr>
<!--#endif
@@ -885,7 +893,7 @@
<tr><td><a href="/graphics/nandakumar-gnu.html">
<img src="/graphics/icons/gnu-gives-freedom.80.png"
alt=" [GNU liberating a computer] " /></a></td>
- <td>GNU da libertad<br />
+ <td>Póster GNU da libertad<br />
<small>de Nandakumar</small></td></tr>
<!--#endif
-->
@@ -894,7 +902,7 @@
<tr><td><a href="/graphics/navaneeth-gnu.html">
<img src="/graphics/icons/give-me-freedom.80.png"
alt=" [A computer dreaming about GNU for freedom] "
/></a></td>
- <td>Dame libertad<br />
+ <td>Póster Dame libertad<br />
<small>de Navaneeth</small></td></tr>
<!--#endif
-->
@@ -922,7 +930,7 @@
<img src="/graphics/icons/plant-onion.80.png"
alt=" [Gnu and Tux plant onions] " /></a></td>
<td>¡Planta cebollas!<br />
- <small>de Péhä</small></td></tr>
+ <small>de Péhä</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|)$/
@@ -938,7 +946,7 @@
&& $TYPE = /^$/" -->
<tr><td><a href="/graphics/reiss-gnuhead.html">
<img src="/graphics/icons/reiss-head.80.png"
- alt=" [Head of a GNU] " /></a></td>
+ alt=" [Colored GNU head] " /></a></td>
<td>Cabeza GNU a color<br />
<small>de Joseph W. Reiss</small></td></tr>
<!--#endif
@@ -948,7 +956,7 @@
<tr><td><a href="/graphics/runfreegnu.html">
<img src="/graphics/icons/runfreegnu.80.png"
alt=" ['Run free run GNU' banner] " /></a></td>
- <td><cite>Run free run GNU</cite><br />
+ <td>Anuncio <cite>Run free run GNU</cite><br />
<small>de Vladimir Zúñiga</small></td></tr>
<!--#endif
-->
@@ -957,7 +965,7 @@
<tr><td><a href="/graphics/santa-gnu.html">
<img src="/graphics/icons/Santa_GNU.80.png"
alt=" [Santa Claus GNU] " /></a></td>
- <td>Gnu Santa Claus<br />
+ <td>GNU Santa Claus<br />
<small>de Luciano Lourenço</small></td></tr>
<!--#endif
-->
@@ -965,7 +973,7 @@
&& $TYPE = /^(poster|)$/" -->
<tr><td><a href="/graphics/scowcroft.html">
<img src="/graphics/icons/gnu-beast.80.png"
- alt=" [GNU with stars] " /></a></td>
+ alt=" [GNU beast poster] " /></a></td>
<td>Caricaturas Gnu<br />
<small>de Carol Anne Scowcroft</small></td></tr>
<!--#endif
@@ -975,7 +983,7 @@
<tr><td><a href="/graphics/skwetu-gnu-logo.html">
<img src="/graphics/icons/skwetu-gnu-logo.80.png"
alt=" [Skwetu's GNU Logo] " /></a></td>
- <td>Un logo GNU sechelt<br />
+ <td>Logo GNU sechelt<br />
<small>de Skwetu</small></td></tr>
<!--#endif
-->
@@ -992,7 +1000,7 @@
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/slickgnu.html">
<img src="/graphics/icons/slickgnu.80.png"
- alt=" [The Spirit of Freedom] " /></a></td>
+ alt=" [A slick GNU logo] " /></a></td>
<td>Un logo de GNU estilizado<br />
<small>de Brian Bush</small></td></tr>
<!--#endif
@@ -1002,7 +1010,7 @@
<tr><td><a href="/graphics/social.html">
<img src="/graphics/icons/gnu-social-logo.80.png"
alt=" [GNU social Logo] " /></a></td>
- <td>El logo de GNU Social<br />
+ <td>Logo de GNU Social<br />
<small>de Jonas Laugs y Steven DuBois</small></td></tr>
<!--#endif
-->
@@ -1029,8 +1037,17 @@
<tr><td><a href="/graphics/stark-gnuherd.html">
<img src="/graphics/icons/gnu_herd_banner.80.png"
alt=" [GNU banner] " /></a></td>
- <td>Anuncio manada<br />
- <small>de Jochen Stärk</small></td></tr>
+ <td>Anuncio manada GNU<br />
+ <small>de Stephan Baumann, grupo de usuarios</small></td></tr>
+<!--#endif
+-->
+<!--#if expr="$THEME = /^(gnuhead|)$/
+ && $TYPE = /^(logo|svg|)$/" -->
+<tr><td><a href="/graphics/sven-gnuhead.html">
+ <img src="/graphics/icons/nu-gnu.80.png"
+ alt=" [Simplified GNU Head] " /></a></td>
+ <td>Cabeza GNU simplificada<br />
+ <small>de Sven H.</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|)$/
@@ -1038,7 +1055,7 @@
<tr><td><a href="/graphics/supergnu-ascii.html">
<img src="/graphics/icons/supergnu-ascii.80.png"
alt=" [ASCII Super Gnu] " /></a></td>
- <td>un súper GNU en ASCII<br />
+ <td>Súper GNU en ASCII<br />
<small>de Vijay Kumar</small></td></tr>
<!--#endif
-->
@@ -1047,7 +1064,7 @@
<tr><td><a href="/graphics/alternative-ascii.html">
<img src="/graphics/icons/alternative-ascii.80.png"
alt=" [ASCII GNU head] " /></a></td>
- <td>Otro GNU en ASCII<br />
+ <td>Un GNU en ASCII alternativo<br />
<small>de Vijay Kumar</small></td></tr>
<!--#endif
-->
@@ -1055,8 +1072,8 @@
&& $TYPE = /^(wallpaper|)$/" -->
<tr><td><a href="/graphics/this-is-freedom-wallpaper.html">
<img src="/graphics/icons/this-is-freedom-wallpaper.80.png"
- alt=" ['this is freedom' wallpaper] " /></a></td>
- <td>Esto es libertad<br />
+ alt=" ['This is freedom' wallpaper] " /></a></td>
+ <td>Fondo de pantalla Esto es libertad<br />
<small>de Vadim Gush</small></td></tr>
<!--#endif
-->
@@ -1127,7 +1144,8 @@
<tr><td><a href="/graphics/fsfsociety/fsfsociety.html">
<img src="/graphics/icons/party.80.png"
alt=" [GNU party] " /></a></td>
- <td>Graphics from <i>Free Software, Free Society</i></td></tr>
+ <td>Fiesta GNU<br />
+ <small>de Etienne Suvasa</small></td></tr>
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|tux|emacs|fs|)$/
@@ -1143,8 +1161,8 @@
&& $TYPE = /^(button|cartoon|icon|svg|)$/" -->
<tr><td><a href="/graphics/gnu-and-freedo/gnu-and-freedo.html">
<img src="/graphics/icons/freedo-logo.80.png"
- alt=" [GNU + Freedo] " /></a></td>
- <td>Caricaturas Gnu + Freedo<br />
+ alt=" [Freedo] " /></a></td>
+ <td>GNU y Freedo<br />
<small>de José Miguel Silva Lara y Márcio Alexandre Silva
Delgado</small></td></tr>
<!--#endif
-->
@@ -1152,7 +1170,7 @@
&& $TYPE = /^(poster|svg|)$/" -->
<tr><td><a href="/graphics/umsa/umsa.html">
<img src="/graphics/icons/gnu-tux.80.png"
- alt=" [Tux riding GNU] " /></a></td>
+ alt=" [Tux riding a strong GNU] " /></a></td>
<td>Diseños para el curso del UMSA «Núcleo GNU/Linux»<br />
<small>de Ruth GarcÃa</small></td></tr>
<!--#endif
@@ -1172,14 +1190,6 @@
<td>Avatares</td></tr>
<!--#endif
-->
-<!--#if expr="$THEME = /^(gnuhead|gnu|)$/
- && $TYPE = /^(svg|)$/" -->
-<tr><td><a href="/graphics/gnusvgart.html">
- <img src="/graphics/icons/dittberner_gnu.80.png"
- alt=" [Running GNU] " /></a></td>
- <td>Imágenes GNU en formato SVG</td></tr>
-<!--#endif
--->
<!--#if expr="$THEME = /^(gnuhead|gnu|emacs|fs|)$/
&& $TYPE = /^(banner|button|plastic|poster|)$/" -->
<tr><td><a href="/graphics/historic-gnu-press.html">
@@ -1217,6 +1227,8 @@
<h3 id="other-sites">Arte gráfico de GNU en otros sitios</h3>
<table>
+
+<!-- RT #1297904 -->
<tr style="display:none"><td></td></tr>
<!-- Dummy entry for xhtml validation.
-->
@@ -1228,10 +1240,12 @@
<td><em>Pepper y Carrot</em> episodio 24</a>, una historieta diseñada con
software libre<br />
<small>de Librefan</small></td></tr>
+
<!--#endif
-->
<!--#if expr="$THEME = /^(gnu|emacs|)$/
&& $TYPE = /^(wallpaper|)$/" -->
+<!-- RT #1242119 -->
<tr><td><a
href="https://goblinrefuge.com/mediagoblin/u/emacsomancer/m/my-god-it-s-full-of-car-s-png">
<img src="/graphics/icons/lisp-meditate.80.png"
@@ -1300,14 +1314,15 @@
href="https://web.archive.org/web/20110513011151/http://graphics.rootmode.com/">
<img src="/graphics/icons/button-powered-by-gnu.80.png"
alt=" ['Powered by GNU' button] " /></a></td>
- <td>Favicon y teclas (archivado)<br />
- <small>de Edward Alfert</small></td></tr>
+ <td>Favicon y teclas <small>(archivado)<br />
+ de Edward Alfert</small></td></tr>
<!--#endif
-->
</table>
<p class="button"><a href="#select">Back to selection form</a></p>
+<!-- RT #902381 -->
<p id="openclipart">También puede encontrar imágenes de dominio público
relativas a GNU en <a
href="https://openclipart.org/search/?query=GNU">openclipart.org</a>.</p>
@@ -1370,7 +1385,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 1996-2007, 2010, 2012-2018 Free Software Foundation,
Inc.</p>
+<p>Copyright © 1996-2007, 2010, 2012-2019 Free Software Foundation,
Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
@@ -1385,7 +1400,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2018/12/15 14:46:11 $
+$Date: 2019/03/13 11:00:58 $
<!-- timestamp end -->
</p>
Index: graphics/philosophicalgnu.es.html
===================================================================
RCS file: /web/www/www/graphics/philosophicalgnu.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- graphics/philosophicalgnu.es.html 14 Feb 2019 11:31:11 -0000 1.25
+++ graphics/philosophicalgnu.es.html 13 Mar 2019 11:00:58 -0000 1.26
@@ -59,8 +59,8 @@
https://web.archive.org/web/20090224214409/http://ngc224.gerwinski.de/~anja/gnuart/markus/index.html
-->
<p>Esta imagen está disponible bajo la <a rel="license"
-href="/licenses/gpl.html">Licencia Pública General de GNU</a>, versión 2 o
-posterior.</p>
+href="/licenses/old-licenses/gpl-2.0.html">Licencia Pública General de
+GNU</a>, versión 2 o posterior.</p>
</div>
</div>
@@ -123,7 +123,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/02/14 11:31:11 $
+$Date: 2019/03/13 11:00:58 $
<!-- timestamp end -->
</p>
Index: graphics/reiss-gnuhead.es.html
===================================================================
RCS file: /web/www/www/graphics/reiss-gnuhead.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- graphics/reiss-gnuhead.es.html 26 Feb 2019 11:30:01 -0000 1.25
+++ graphics/reiss-gnuhead.es.html 13 Mar 2019 11:00:58 -0000 1.26
@@ -43,8 +43,8 @@
<p>Copyright © 2000 Free Software Foundation, Inc.</p>
<p>Esta imagen está disponible bajo la <a rel="license"
-href="/licenses/gpl.html">Licencia Pública general de GNU</a>, versión 2 o
-posterior, o la <a rel="license"
+href="/licenses/old-licenses/gpl-2.0.html">Licencia Pública general de
+GNU</a>, versión 2 o posterior, o la <a rel="license"
href="https://directory.fsf.org/wiki/License:Free-Art-L-v1.3">Licencia de
Arte Libre</a>.</p>
@@ -117,7 +117,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/02/26 11:30:01 $
+$Date: 2019/03/13 11:00:58 $
<!-- timestamp end -->
</p>
Index: graphics/usegnu.es.html
===================================================================
RCS file: /web/www/www/graphics/usegnu.es.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- graphics/usegnu.es.html 15 Dec 2018 14:46:11 -0000 1.23
+++ graphics/usegnu.es.html 13 Mar 2019 11:00:58 -0000 1.24
@@ -1,50 +1,64 @@
<!--#set var="ENGLISH_PAGE" value="/graphics/usegnu.en.html" -->
<!--#include virtual="/server/header.es.html" -->
-<!-- Parent-Version: 1.86 -->
+<!-- Parent-version: 1.87 -->
<!-- This file is automatically generated by GNUnited Nations! -->
-<title>Use 'GNU - Proyecto GNU - Free Software Foundation</title>
+<title>Use 'GNU, de Etienne Suvasa y el equipo de la FSF - Proyecto GNU - Free
+Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/graphics/graphics.css"
media="print,screen" />
+<style type="text/css" media="print,screen"><!--
+.reduced-width { width: 55em; }
address@hidden (min-width: 43em) {
+ #navigation li#more-links, #back-to-top { display: none; }
+}
+-->
+</style>
<!--#include virtual="/graphics/po/usegnu.translist" -->
<!--#include virtual="/server/banner.es.html" -->
<h2>Use 'GNU</h2>
-<p>
-<a href="/graphics/use-gnu-sm.jpg"><img src="/graphics/use-gnu-sm.jpg"
- alt=" [Pseudo-Lisp (Use 'GNU)] "
- width="139" height="111" /></a>
-</p>
+<p class="byline">de Etienne Suvasa y el equipo de la FSF</p>
-<p>
-En esta declaración sobre GNU al estilo Lisp, en el borde superior curvado
+<div class="reduced-width">
+<div class="pict narrow">
+ <a href="/graphics/use-gnu.jpg"><img
+ src="/graphics/use-gnu.jpg"
+ alt=" [Pseudo-Lisp (Use 'GNU)] " /></a>
+</div>
+
+<p>En esta declaración sobre GNU al estilo Lisp, en el borde superior curvado
se lee la frase «<cite>GNU's Not Unix</cite>» (GNU No es Unix) y en el borde
inferior, «<cite>Free Software Foundation</cite>». Dos «paréntesis» con
forma de GNU curvados y danzantes forman un programa seudo Lisp: (USE
-'GNU).
-</p>
+'GNU). </p>
-<p>
-Los paréntesis con forma de GNU danzantes fueron diseñados por Etienne
-Suvasa. Figuran en la portada del <a href="/manual/manual.html#emacs">Manual
-de referencia de Emacs Lisp</a>.
-</p>
+<p>Los paréntesis con forma de GNU danzantes fueron diseñados por Etienne
+Suvasa; fFiguran en la portada del <a
+href="https://shop.fsf.org/collection/books-docs">Manual de referencia de
+Emacs Lisp</a>. El resto fue diseñado por el equipo de la FSF para la <a
+href="https://shop.fsf.org/collection/gnu-gear#Tshirts">camiseta GNU</a> de
+1996.</p>
-<p>
-El resto de la imagen fue diseñado por personal de la FSF para las <a
-href="/order/t-shirts.html">camisetas de GNU</a> de 1996.
-</p>
-
-<p>
-Esta imagen está disponible en los siguientes formatos:
-</p>
<ul>
- <li>jpeg <a href="/graphics/use-gnu-sm.jpg">6k</a>, <a
-href="/graphics/use-gnu.jpg">17k</a></li>
- <li>png <a href="/graphics/use-gnu-sm.png">2k</a>, <a
-href="/graphics/use-gnu.png">5k</a></li>
+ <li>JPEG <a href="/graphics/use-gnu-sm.jpg">4kB</a> (139x111), <a
+href="/graphics/use-gnu.jpg">16kB</a> (331x264)</li>
+ <li>PNG <a href="/graphics/use-gnu-sm.png">1.3kB</a> (139x111),
<a
+href="/graphics/use-gnu.png">4kB</a> (331x264)</li>
</ul>
+<div id="license" class="infobox">
+<hr />
+<p>Copyright © 1998 Etienne Suvasa (paréntesis danzantes)<br />
+ Copyright © 1998 Free Software Foundation, Inc. (text)</p>
+
+<p>Esta página está bajo la licencia <a rel="license"
+href="http://creativecommons.org/licenses/by-sa/4.0/deed.es_ES">Creative
+Commons Reconocimiento-CompartirIgual 4.0 Internacional</a>.</p>
+</div>
+</div>
+
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -88,25 +102,10 @@
el envÃo de traducciones de las páginas de este sitio web.</p>
</div>
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 4.0. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2018 Free Software Foundation, Inc.</p>
-
-<p>Esta página está bajo licencia <a rel="license"
+<!-- Please only list the latest year the page was modified. -->
+<p><em>Texto de la página:</em> Copyright © 2019 Free Software
+Foundation, Inc.<br />
+Disponible bajo la licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
Commons Reconocimiento-SinObraDerivada 4.0 Internacional</a>.</p>
@@ -119,7 +118,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2018/12/15 14:46:11 $
+$Date: 2019/03/13 11:00:58 $
<!-- timestamp end -->
</p>
Index: graphics/po/graphics.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/graphics.es-en.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- graphics/po/graphics.es-en.html 15 Dec 2018 14:46:13 -0000 1.47
+++ graphics/po/graphics.es-en.html 13 Mar 2019 11:00:58 -0000 1.48
@@ -29,16 +29,11 @@
tr {
display: inline-block;
width: 18.5em;
- margin: .5em 0;
}
table td {
- padding: 0;
+ padding: 0 .5em;
border: none;
}
-table img {
- margin-right: 1em;
-}
-
@media (min-width: 22em) {
table {
width: 20.5em;
@@ -124,8 +119,8 @@
--><option value="ascii" selected="selected">ASCII / TTY art</option><!--#else
--><option value="ascii">ASCII / TTY art</option><!--#endif -->
<!--#if expr="$TYPE = banner"
---><option value="banner" selected="selected">banner / badge /
T-shirt</option><!--#else
---><option value="banner">banner / badge / T-shirt</option><!--#endif -->
+--><option value="banner" selected="selected">banner / badge /
t-shirt</option><!--#else
+--><option value="banner">banner / badge / t-shirt</option><!--#endif -->
<!--#if expr="$TYPE = button"
--><option value="button" selected="selected">button / stamp /
sticker</option><!--#else
--><option value="button">button / stamp / sticker</option><!--#endif -->
@@ -179,7 +174,7 @@
<tr><td><a href="/graphics/arantxa.html">
<img src="/graphics/icons/arantxa-glitch.80.png"
alt=" [Glitch] " /></a></td>
- <td>July 2018: GNU designs<br />
+ <td>July 2018: Sunny GNU designs<br />
<small>by Arantxa Serantes</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|tux|rms|)$/
&& $TYPE = /^(cartoon|)$/" -->
@@ -237,18 +232,18 @@
&& $TYPE = /^$/" -->
<tr><td><a href="/graphics/3dgnuhead.html">
<img src="/graphics/icons/3dgnuhead.80.png"
- alt=" [3D GNU Head] " /></a></td>
- <td>3D GNU Head<br />
+ alt=" [Portrait of GNU] " /></a></td>
+ <td>Portrait of GNU<br />
<small>by Dale Mellor</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^$/" -->
<tr><td><a href="/graphics/agnubody.html">
<img src="/graphics/icons/agnubody.80.png"
- alt=" [A GNU Body] " /></a></td>
+ alt=" [A Gnu Body] " /></a></td>
<td>A Gnu Body<br />
<small>by Graham Wilson</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
- && $TYPE = /^$/" -->
+ && $TYPE = /^(svg|ascii|logo|)$/" -->
<tr><td><a href="/graphics/agnuhead.html">
<img src="/graphics/icons/gnu-head.80.png"
alt=" [Image of the head of a GNU] " /></a></td>
@@ -256,81 +251,80 @@
<small>by Etienne Suvasa,<br />
and derived images</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
- && $TYPE = /^(ascii|)$/" -->
+ && $TYPE = /^(ascii|logo|)$/" -->
<tr><td><a href="/graphics/agnuheadterm.html">
<img src="/graphics/icons/agnuheadterm.80.png"
- alt=" [GNU Head] " /></a></td>
- <td>A GNU Head for terminals<br />
+ alt=" [GNU Head for terminal] " /></a></td>
+ <td>A GNU Head in terminals<br />
<small>by Mattias Andrée</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/ahurdlogo.html">
<img src="/graphics/icons/hurd-logo.80.png"
- alt=" [image of a Spherical Hurd Logo] " /></a></td>
- <td>Hurd logos<br />
- <small>resp. by Teddy Hogeborn and
- Stephen McCamant</small></td></tr><!--#endif
+ alt=" [Spherical Hurd Logo] " /></a></td>
+ <td>Spherical Hurd Logo<br />
+ <small>by Teddy Hogeborn</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/anfsflogo.html">
- <img src="/graphics/icons/fsf-logo.80.png"
- alt=" [image of an FSF Logo on black] " /></a></td>
- <td>An FSF logo<br />
+ <img src="/graphics/icons/fsf-bk.80.png"
+ alt=" [FSF Logo on black] " /></a></td>
+ <td>FSF logos<br />
<small>by Shawn Ewald</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/anlpflogo.html">
<img src="/graphics/icons/liberty.80.png"
- alt=" [image of the Statue of Liberty Protecting Software
Freedoms] " /></a></td>
+ alt=" [Statue of Liberty protecting software freedoms] "
/></a></td>
<td>An LPF logo<br />
<small>by Etienne Suvasa</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
- && $TYPE = /^(badge|)$/" -->
+ && $TYPE = /^(svg|banner|logo|)$/" -->
<tr><td><a href="/graphics/atypinggnu.html">
<img src="/graphics/icons/gnu-type.80.png"
- alt=" [image of a Typing GNU Hacker] " /></a></td>
- <td>A typing Gnu hacker<br />
+ alt=" [Typing GNU hacker] " /></a></td>
+ <td>A typing GNU hacker<br />
<small>by Jamal Hannah</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
- && $TYPE = /^(badge|)$/" -->
+ && $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/anothertypinggnu.html">
<img src="/graphics/icons/another-gnu-type.80.png"
- alt=" [image of Another GNU Hacker] " /></a></td>
- <td>Another typing Gnu hacker<br />
+ alt=" [Another typing GNU hacker] " /></a></td>
+ <td>Another typing GNU hacker<br />
<small>by Peter McLachlan</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(banner|logo|)$/" -->
<tr><td><a href="/graphics/arantxa.html">
<img src="/graphics/icons/arantxa-glitch.80.png"
alt=" [Glitch] " /></a></td>
- <td>GNU designs<br />
+ <td>Sunny GNU designs<br />
<small>by Arantxa Serantes</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
- && $TYPE = /^$/" -->
+ && $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/babygnu.html">
<img src="/graphics/icons/baby-gnu.80.png"
- alt=" [image of a Baby GNU] " /></a></td>
- <td>Baby Gnu<br />
+ alt=" [Baby GNU sucking its thumb] " /></a></td>
+ <td>Baby GNU<br />
<small>by Etienne Suvasa</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/barr-gnu.html">
<img src="/graphics/icons/barr-gnu.80.png"
alt=" [GNU logo] " /></a></td>
- <td>GNU logo<br />
+ <td>GNU Logo<br />
<small>by Paul Barr</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|emacs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/bokma-gnu.html">
<img src="/graphics/icons/bokma-gnu.80.png"
- alt=" [image of a GNU] " /></a></td>
- <td>GNU and Emacs logos<br />
+ alt=" [GNU logo] " /></a></td>
+ <td>GNU and Emacs Logos<br />
<small>by John Bokma</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(svg|)$/" -->
<tr><td><a href="/graphics/bold-initiative-GNU-head.html">
<img src="/graphics/icons/bold-initiative-GNU-head.80.png"
- alt=" [Bold Initiative GNU Head] " /></a></td>
+ alt=" [Winking GNU Head] " /></a></td>
<td>Winking GNU<br />
<small>by Bravo Edison</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|gnu|tux|)$/
@@ -338,15 +332,15 @@
<tr><td><a href="/graphics/BVBN.html">
<img src="/graphics/icons/bvbn-logo-small.80.png"
alt=" [GNU Head logo] " /></a></td>
- <td>Useful GNU art<br />
+ <td>GNU/Linux buttons<br />
<small>by Vladimir Tsarkov</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|tux|)$/
&& $TYPE = /^(poster|)$/" -->
<tr><td><a href="/graphics/bwcartoon.html">
- <img src="/graphics/icons/bwcartoon.80.png"
- alt=" [B & W Cartoon] " /></a></td>
- <td>The Dynamic Duo: The Gnu and the Penguin
- in flight</td></tr><!--#endif
+ <img src="/graphics/icons/gnu-and-penguin-color.80.png"
+ alt=" [The Gnu and the Penguin in flight] " /></a></td>
+ <td>The Dynamic Duo: The Gnu and the Penguin in flight<br />
+ <small>by an anonymous artist</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(license|)$/
&& $TYPE = /^(button|)$/" -->
<tr><td><a href="/graphics/copyleft-sticker.html">
@@ -358,15 +352,23 @@
&& $TYPE = /^(banner|svg|)$/" -->
<tr><td><a href="/graphics/digital-restrictions-management.html">
<img src="/graphics/icons/ichain.80.png"
- alt=" [iChains] " /></a></td>
- <td>Digital Restrictions Management<br />
+ alt=" [The chains of Digital Restrictions
+ Management] " /></a></td>
+ <td>GNU Art — Digital Restrictions Management<br />
<small>by Chris Hayes</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/distros-dragora.html">
<img src="/graphics/icons/distros-dragora.80.png"
alt=" [Dragora Logo] " /></a></td>
- <td>Dragora logo<br /></td></tr><!--#endif
+ <td>Dragora Logo<br /></td></tr><!--#endif
+--><!--#if expr="$THEME = /^(gnu|)$/
+ && $TYPE = /^(wallpaper|)$/" -->
+<tr><td><a href="/graphics/dittberner-gnu.html">
+ <img src="/graphics/icons/dittberner_gnu.80.png"
+ alt=" [Running gnu] " /></a></td>
+ <td>Running Gnu<br />
+ <small>by Dorothea and Jan Dittberner</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(surveillance|)$/
&& $TYPE = /^(cartoon|)$/" -->
<tr><td><a href="/graphics/dog.html">
@@ -379,13 +381,13 @@
<tr><td><a href="/graphics/emacs-ref.html">
<img src="/graphics/icons/emacs-ref.80.png"
alt=" [Reference card with GNU face] " /></a></td>
- <td>GNU Emacs Reference Wallpaper<br />
+ <td>GNU Emacs Reference Card<br />
<small>by Loic Duros</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(poster|svg|wallpaper|)$/" -->
<tr><td><a href="/graphics/flying-gnu.html">
<img src="/graphics/icons/flying-gnu.80.png"
- alt=" [Flying GNU Design] " /></a></td>
+ alt=" [Flying GNU design] " /></a></td>
<td>Flying Gnu<br />
<small>by Ernesto Bazzano</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(rms|fs|)$/
@@ -409,23 +411,23 @@
alt=" [Gnu and Tux as messengers of free software in the
desolate land of proprietary software] " /></a></td>
<td>Free-Software Dealers<br />
- <small>by Péhä</small></td></tr><!--#endif
+ <small>by Péhä</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(wallpaper|)$/" -->
<tr><td><a href="/graphics/free-your-soul.html">
<img src="/graphics/icons/free-your-soul-wallpaper.80.png"
- alt=" [ Free Your Soul Wallpaper ] " /></a></td>
- <td>Free Your Soul<br />
+ alt=" [Free Your Soul wallpaper] " /></a></td>
+ <td>Free Your Soul wallpaper<br />
<small>by Sayem Chaklader</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|tux|)$/
&& $TYPE = /^(button|svg|)$/" -->
<tr><td><a href="/graphics/french-motto.html">
<img src="/graphics/icons/LEF.fr.80.png"
alt=" [liberty, equality, brotherhood button] " /></a></td>
- <td>French motto<br />
- <small>by Lutz Bürger</small></td></tr><!--#endif
+ <td>French Motto button<br />
+ <small>by Lutz Bürger</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
- && $TYPE = /^$/" -->
+ && $TYPE = /^(button|)$/" -->
<tr><td><a href="/graphics/fromagnulinux.html">
<img src="/graphics/icons/fromagnulinux.80.png"
alt=" [Fromagnulinux] " /></a></td>
@@ -435,15 +437,16 @@
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/fsf-logo.html">
<img src="/graphics/icons/fsf-logo-notext.80.png"
- alt=" [The Official FSF Logo] " /></a></td>
- <td>Free Software Foundation logo<br />
+ alt=" [The official FSF logo] " /></a></td>
+ <td>Free Software Foundation Logo<br />
<small>by Li Jiang</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/FSFS-logo.html">
<img src="/graphics/icons/FSFS-title2.80.png"
alt=" [The book cover logo for 'Free Software, Free
Society'] " /></a></td>
- <td>Book cover logo for Free Software, Free Society</td></tr><!--#endif
+ <td>Book cover logo for Free Software, Free Society<br />
+ <small>by Jonathan Richard</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/gg3po.html">
@@ -455,15 +458,15 @@
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/gleesons.html">
<img src="/graphics/icons/gleeson_head.80.png"
- alt=" [colorful rounded image of the Head of a GNU] "
/></a></td>
- <td>GNU art<br />
+ alt=" [Colorful rounded image of the head of a GNU] "
/></a></td>
+ <td>GNU Art<br />
<small>by Brendon Gleeson</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/gNewSense.html">
<img src="/graphics/icons/gnewsense.80.png"
alt=" [gNewSense Logo] " /></a></td>
- <td>gNewSense logo<br />
+ <td>gNewSense Logo<br />
<small>by Li Jiang</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(banner|svg|)$/" -->
@@ -472,22 +475,24 @@
alt=" [GNU 30th - Celebrating 30 years] " /></a></td>
<td>GNU 30th birthday</td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
- && $TYPE = /^(wallpaper|)$/" -->
+ && $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/gnu-alternative.html">
<img src="/graphics/icons/gnu-alternative.80.png"
- alt=" [image of the Head of a GNU] " /></a></td>
- <td>Alternative GNU Head</td></tr><!--#endif
+ alt=" [Stylized gnu mask] " /></a></td>
+ <td>GNU Alternative<br />
+ <small>by an anonymous artist</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(ascii|)$/" -->
<tr><td><a href="/graphics/gnu-ascii.html">
<img src="/graphics/icons/gnu-ascii.80.png"
- alt=" [ASCII Gnu] " /></a></td>
- <td>An ASCII GNU</td></tr><!--#endif
+ alt=" [ASCII Gnu head] " /></a></td>
+ <td>ASCII GNU<br />
+ <small>by Przemysław Borys</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(ascii|button|icon|)$/" -->
<tr><td><a href="/graphics/gnu-ascii2.html">
<img src="/graphics/icons/gnu-ascii2.80.png"
- alt=" [ASCII Gnu] " /></a></td>
+ alt=" [Small ASCII Gnu head] " /></a></td>
<td>Another ASCII GNU (for email signatures)<br />
<small>by Martin Dickopp</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
@@ -495,13 +500,13 @@
<tr><td><a href="/graphics/gnu-ascii-liberty.html">
<img src="/graphics/icons/gnu-ascii-liberty.80.png"
alt=" [ASCII Gnu is liberty] " /></a></td>
- <td>An ASCII “GNU is Liberty”<br />
+ <td>ASCII “GNU is Liberty”<br />
<small>by Carlos Contreras A.</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(badge|wallpaper|)$/" -->
<tr><td><a href="/graphics/gnu-born-free-run-free.html">
<img src="/graphics/icons/gnu-born-free-run-free.80.png"
- alt=" [A gnu running] " /></a></td>
+ alt=" [GNU Born Free Runs Free] " /></a></td>
<td>GNU Born Free Runs Free<br />
<small>by Alicia Lapekas</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
@@ -509,15 +514,15 @@
<tr><td><a href="/graphics/gnu-head-luk.html">
<img src="/graphics/icons/gnu-head-luk.80.png"
alt=" [Luk's GNU head] " /></a></td>
- <td>GNU Head<br />
+ <td>Stylized GNU Head<br />
<small>by Luk</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(svg|)$/" -->
<tr><td><a href="/graphics/gnu-head-shadow.html">
<img src="/graphics/icons/gnu_headshadow.80.png"
alt=" [GNU banner saying: run free run gnu] " /></a></td>
- <td>A GNU Head shadowed<br />
- <small>by Vladimir Zúñiga</small></td></tr><!--#endif
+ <td>GNU Head shadowed<br />
+ <small>by Vladimir Zúñiga</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/gnu-inside.html">
@@ -530,7 +535,7 @@
<tr><td><a href="/graphics/gnu-jacket.html">
<img src="/graphics/icons/gnu-jacket.80.png"
alt=" [Gnu wearing a jacket] " /></a></td>
- <td>A Gnu wearing a jacket<br />
+ <td>A Gnu Wearing a Jacket<br />
<small>by Sarah Katzenell Rabkin</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^$/
&& $TYPE = /^(logo|svg|)$/" -->
@@ -543,30 +548,30 @@
&& $TYPE = /^(wallpaper|)$/" -->
<tr><td><a href="/graphics/gnu-slash-linux.html">
<img src="/graphics/icons/gnu-linux-on-black.80.png"
- alt=" [GNU/Linux on black] " /></a></td>
- <td>GNU/Linux art<br />
+ alt=" [Gnu and Tux on black] " /></a></td>
+ <td>GNU/Linux Art<br />
<small>by Rui Damas</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/gnubanner.html">
<img src="/graphics/icons/gnubanner-2.80.png"
alt=" [Come and see what GNU creates for YOU] " /></a></td>
- <td>GNU banners<br />
- <small>resp. by Stefan Rieken, Lalo Martins,
+ <td>GNU banners and link<br />
+ <small>resp. by Stefan Rieken, John M. Wooten
and SpAwN</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/gnuhornedlogo.html">
<img src="/graphics/icons/gnu_hornedword.80.png"
alt=" [GNU Horned Word Logo] " /></a></td>
- <td>A GNU logo with horns<br />
- <small>by Vladimir Zúñiga</small></td></tr><!--#endif
+ <td>GNU Horned Logo<br />
+ <small>by Vladimir Zúñiga</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|tux|)$/
&& $TYPE = /^(poster|)$/" -->
<tr><td><a href="/graphics/gnulove.html">
<img src="/graphics/icons/Gnulove.80.png"
alt=" [GNU Love] " /></a></td>
- <td>A Penguin Hugging A Gnu<br />
+ <td>GNU Love<br />
<small>by Alison Upton</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(plastic|)$/" -->
@@ -579,8 +584,8 @@
&& $TYPE = /^(badge|logo|)$/" -->
<tr><td><a href="/graphics/gnupascal.html">
<img src="/graphics/icons/Gnu+Pascal.80.png"
- alt=" [image of a Gnu and Blaise Pascal] " /></a></td>
- <td>Gnu and Blaise Pascal<br />
+ alt=" [A Gnu and Blaise Pascal] " /></a></td>
+ <td>GNU and Blaise Pascal<br />
<small>by Markus Gerwinski</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(plastic|)$/" -->
@@ -593,36 +598,36 @@
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/groff-head.html">
<img src="/graphics/icons/groff-head.80.png"
- alt=" [image of the Head of a GNU with a printing press] "
/></a></td>
- <td>Groff Head<br />
+ alt=" [Head of a GNU with a printing press] " /></a></td>
+ <td>GNU Head with Printing Press<br />
<small>by Imogen Mulley</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/heckert_gnu.html">
<img src="/graphics/icons/heckert_gnu.80.png"
alt=" [Bold image of the head of a GNU] " /></a></td>
- <td>Bold alternative GNU Head<br />
- <small>by Aurelio A. Heckert</small></td></tr><!--#endif
+ <td>A Bold GNU Head<br />
+ <small>by Aurélio A. Heckert</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(wallpaper|)$/" -->
<tr><td><a href="/graphics/hitflip-gnu.html">
<img src="/graphics/icons/hitflip-gnu.80.png"
- alt=" [Hitflip 1 small] " /></a></td>
- <td>GNU coin and herd<br />
+ alt=" [GNU coin] " /></a></td>
+ <td>GNU Coin and Herd<br />
<small>by the Hitflip Team</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/httptunnel-logo.html">
<img src="/graphics/icons/httptunnel-w.80.png"
- alt=" [httptunnel logo] " /></a></td>
- <td>HTTP-Tunnel logo<br />
+ alt=" [HTTPTunnel logo] " /></a></td>
+ <td>HTTPTunnel Logo<br />
<small>by Harri Manni</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|)$/" -->
<tr><td><a href="/graphics/hurd_mf.html">
<img src="/graphics/icons/hurd_mf.80.png"
- alt=" [small image of a Hurd Metafont Logo] " /></a></td>
- <td>Hurd logos in Metafont<br />
+ alt=" [Hurd Metafont logo] " /></a></td>
+ <td>Hurd Logo in Metafont<br />
<small>by Stephen McCamant</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^$/
&& $TYPE = /^(cartoon|)$/" -->
@@ -663,7 +668,7 @@
&& $TYPE = /^(icon|)$/" -->
<tr><td><a href="/graphics/gnu-and-tux-icon.html">
<img src="/graphics/icons/gnu-and-tux-icon.80.png"
- alt=" [GNU and Tux] " /></a></td>
+ alt=" [Gnu and Tux icon] " /></a></td>
<td>Gnu and Tux Icon<br />
<small>by Sventsitskaya Nadezda</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
@@ -671,14 +676,14 @@
<tr><td><a href="/graphics/nandakumar-gnu.html">
<img src="/graphics/icons/gnu-gives-freedom.80.png"
alt=" [GNU liberating a computer] " /></a></td>
- <td>GNU Gives Freedom<br />
+ <td>GNU Gives Freedom poster<br />
<small>by Nandakumar</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(cartoon|svg|)$/" -->
<tr><td><a href="/graphics/navaneeth-gnu.html">
<img src="/graphics/icons/give-me-freedom.80.png"
alt=" [A computer dreaming about GNU for freedom] "
/></a></td>
- <td>Give Me Freedom<br />
+ <td>Give Me Freedom poster<br />
<small>by Navaneeth</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(svg|)$/" -->
@@ -700,7 +705,7 @@
<img src="/graphics/icons/plant-onion.80.png"
alt=" [Gnu and Tux plant onions] " /></a></td>
<td>Plant Onions!<br />
- <small>by Péhä</small></td></tr><!--#endif
+ <small>by Péhä</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(banner|)$/" -->
<tr><td><a href="/graphics/r4sh-gnu-vaporwave.html">
@@ -712,7 +717,7 @@
&& $TYPE = /^$/" -->
<tr><td><a href="/graphics/reiss-gnuhead.html">
<img src="/graphics/icons/reiss-head.80.png"
- alt=" [Head of a GNU] " /></a></td>
+ alt=" [Colored GNU head] " /></a></td>
<td>Color GNU Head<br />
<small>by Joseph W. Reiss</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
@@ -720,20 +725,20 @@
<tr><td><a href="/graphics/runfreegnu.html">
<img src="/graphics/icons/runfreegnu.80.png"
alt=" ['Run free run GNU' banner] " /></a></td>
- <td>Run free run GNU<br />
- <small>by Vladimir Zúñiga</small></td></tr><!--#endif
+ <td>Run free run GNU banner<br />
+ <small>by Vladimir Zúñiga</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(svg|)$/" -->
<tr><td><a href="/graphics/santa-gnu.html">
<img src="/graphics/icons/Santa_GNU.80.png"
alt=" [Santa Claus GNU] " /></a></td>
- <td>Santa Claus Gnu<br />
- <small>by Luciano Lourenço</small></td></tr><!--#endif
+ <td>Santa Claus GNU<br />
+ <small>by Luciano Lourenço</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(poster|)$/" -->
<tr><td><a href="/graphics/scowcroft.html">
<img src="/graphics/icons/gnu-beast.80.png"
- alt=" [GNU with stars] " /></a></td>
+ alt=" [GNU beast poster] " /></a></td>
<td>Gnu Characters<br />
<small>by Carol Anne Scowcroft</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
@@ -741,28 +746,28 @@
<tr><td><a href="/graphics/skwetu-gnu-logo.html">
<img src="/graphics/icons/skwetu-gnu-logo.80.png"
alt=" [Skwetu's GNU Logo] " /></a></td>
- <td>A Shishalh GNU logo<br />
+ <td>Salish GNU logo<br />
<small>by Skwetu</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|fs|)$/
&& $TYPE = /^(banner|wallpaper|)$/" -->
<tr><td><a href="/graphics/skwid-wallpapers.html">
<img src="/graphics/icons/skwid-free-side-wallpaper.80.png"
alt=" [Free Side of the Force wallpaper] " /></a></td>
- <td>GNU designs<br />
+ <td>GNU Designs<br />
<small>by Ben “Skwid” Gailly</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/slickgnu.html">
<img src="/graphics/icons/slickgnu.80.png"
- alt=" [The Spirit of Freedom] " /></a></td>
- <td>A slick GNU logo<br />
+ alt=" [A slick GNU logo] " /></a></td>
+ <td>A Slick GNU Logo<br />
<small>by Brian Bush</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/social.html">
<img src="/graphics/icons/gnu-social-logo.80.png"
alt=" [GNU social Logo] " /></a></td>
- <td>The GNU Social logo<br />
+ <td>GNU Social logo<br />
<small>by Jonas Laugs and Steven DuBois</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|tux|)$/
&& $TYPE = /^(poster|wallpaper|)$/" -->
@@ -783,35 +788,42 @@
<tr><td><a href="/graphics/stark-gnuherd.html">
<img src="/graphics/icons/gnu_herd_banner.80.png"
alt=" [GNU banner] " /></a></td>
- <td>Herd Banner<br />
- <small>by Jochen Stärk</small></td></tr><!--#endif
+ <td>GNU Herd Banner<br />
+ <small>by Stephan Baumann, usegroup</small></td></tr><!--#endif
+--><!--#if expr="$THEME = /^(gnuhead|)$/
+ && $TYPE = /^(logo|svg|)$/" -->
+<tr><td><a href="/graphics/sven-gnuhead.html">
+ <img src="/graphics/icons/nu-gnu.80.png"
+ alt=" [Simplified GNU Head] " /></a></td>
+ <td>Simplified GNU Head<br />
+ <small>by Sven H.</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(ascii|)$/" -->
<tr><td><a href="/graphics/supergnu-ascii.html">
<img src="/graphics/icons/supergnu-ascii.80.png"
alt=" [ASCII Super Gnu] " /></a></td>
- <td>An ASCII Super Gnu<br />
+ <td>ASCII Super Gnu<br />
<small>by Vijay Kumar</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(ascii|)$/" -->
<tr><td><a href="/graphics/alternative-ascii.html">
<img src="/graphics/icons/alternative-ascii.80.png"
alt=" [ASCII GNU head] " /></a></td>
- <td>Another ASCII GNU<br />
+ <td>An Alternative ASCII GNU<br />
<small>by Vijay Kumar</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(wallpaper|)$/" -->
<tr><td><a href="/graphics/this-is-freedom-wallpaper.html">
<img src="/graphics/icons/this-is-freedom-wallpaper.80.png"
- alt=" ['this is freedom' wallpaper] " /></a></td>
- <td>This is Freedom<br />
+ alt=" ['This is freedom' wallpaper] " /></a></td>
+ <td>This is Freedom wallpaper<br />
<small>by Vadim Gush</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(fs|)$/
&& $TYPE = /^(logo|svg|)$/" -->
<tr><td><a href="/graphics/Trisquel.html">
<img src="/graphics/icons/trisquel.80.png"
alt=" [Trisquel Logo] " /></a></td>
- <td>Trisquel logo</td></tr><!--#endif
+ <td>Trisquel Logo</td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(badge|banner|)$/" -->
<tr><td><a href="/graphics/usegnu.html">
@@ -831,7 +843,7 @@
<tr><td><a href="/graphics/winkler-gnu.html">
<img src="/graphics/icons/winkler-gnu.80.png"
alt=" [Kyle's Alternative GNU logo] " /></a></td>
- <td>Alternative GNU logo<br />
+ <td>Alternative GNU Logo<br />
<small>by Kyle Winkler</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|gnu|)$/
&& $TYPE = /^$/" -->
@@ -845,7 +857,7 @@
<tr><td><a href="/graphics/bahlon/index.html">
<img src="/graphics/icons/3d-gnu-head.80.png"
alt=" [3D Gnu head] " /></a></td>
- <td>3D GNU Head<br />
+ <td>GNU Head in 3D<br />
<small>by Georg Bahlon</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|)$/
&& $TYPE = /^(button|svg|)$/" -->
@@ -859,7 +871,8 @@
<tr><td><a href="/graphics/fsfsociety/fsfsociety.html">
<img src="/graphics/icons/party.80.png"
alt=" [GNU party] " /></a></td>
- <td>Graphics from <i>Free Software, Free Society</i></td></tr><!--#endif
+ <td>GNU Party<br />
+ <small>by Etienne Suvasa</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|tux|emacs|fs|)$/
&& $TYPE = /^(banner|button|cartoon|svg|)$/" -->
<tr><td><a href="/graphics/gnu-post/index.html">
@@ -871,18 +884,18 @@
&& $TYPE = /^(button|cartoon|icon|svg|)$/" -->
<tr><td><a href="/graphics/gnu-and-freedo/gnu-and-freedo.html">
<img src="/graphics/icons/freedo-logo.80.png"
- alt=" [GNU + Freedo] " /></a></td>
- <td>Gnu + Freedo characters<br />
+ alt=" [Freedo] " /></a></td>
+ <td>GNU and Freedo<br />
<small>by José Miguel Silva Lara and Márcio Alexandre
Silva Delgado</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|tux|)$/
&& $TYPE = /^(poster|svg|)$/" -->
<tr><td><a href="/graphics/umsa/umsa.html">
<img src="/graphics/icons/gnu-tux.80.png"
- alt=" [Tux riding GNU] " /></a></td>
+ alt=" [Tux riding a strong GNU] " /></a></td>
<td>Designs for the UMSA course
“Núcleo GNU/Linux”<br />
- <small>by Ruth GarcÃa</small></td></tr><!--#endif
+ <small>by Ruth García</small></td></tr><!--#endif
-->
</table>
@@ -895,12 +908,6 @@
<img src="/graphics/icons/avatar-3d-baby-gnu.80.png"
alt=" [An avatar based on Georg Bahlon's 3D GNU head] "
/></a></td>
<td>Avatars</td></tr><!--#endif
---><!--#if expr="$THEME = /^(gnuhead|gnu|)$/
- && $TYPE = /^(svg|)$/" -->
-<tr><td><a href="/graphics/gnusvgart.html">
- <img src="/graphics/icons/dittberner_gnu.80.png"
- alt=" [Running GNU] " /></a></td>
- <td>GNU art in SVG format</td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnuhead|gnu|emacs|fs|)$/
&& $TYPE = /^(banner|button|plastic|poster|)$/" -->
<tr><td><a href="/graphics/historic-gnu-press.html">
@@ -931,6 +938,7 @@
<h3 id="other-sites">GNU Art on other sites</h3>
<table>
+<!-- RT #1297904 -->
<tr style="display:none"><td></td></tr><!-- Dummy entry for xhtml validation.
--><!--#if expr="$THEME = /^(gnu|tux|rms|)$/
&& $TYPE = /^(cartoon|)$/" -->
@@ -941,6 +949,7 @@
<small>by Librefan</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|emacs|)$/
&& $TYPE = /^(wallpaper|)$/" -->
+<!-- RT #1242119 -->
<tr><td><a
href="https://goblinrefuge.com/mediagoblin/u/emacsomancer/m/my-god-it-s-full-of-car-s-png">
<img src="/graphics/icons/lisp-meditate.80.png"
alt=" [Meditating GNU with Lisp on background] " /></a></td>
@@ -959,7 +968,7 @@
<img src="/graphics/icons/fsf-cuaderno.80.png"
alt=" [FSF art] " /></a></td>
<td>Free software art<br />
- <small>by David Arroyo Menéndez</small></td></tr><!--#endif
+ <small>by David Arroyo Menéndez</small></td></tr><!--#endif
--><!--#if expr="$THEME = /^(gnu|)$/
&& $TYPE = /^(poster|)$/" -->
<tr><td><a href="https://apolonis.deviantart.com/art/Le-Sage-285523519">
@@ -993,13 +1002,13 @@
<tr><td><a
href="https://web.archive.org/web/20110513011151/http://graphics.rootmode.com/">
<img src="/graphics/icons/button-powered-by-gnu.80.png"
alt=" ['Powered by GNU' button] " /></a></td>
- <td>Favicon and buttons (archived)<br />
- <small>by Edward Alfert</small></td></tr><!--#endif
+ <td>Favicon and buttons <small>(archived)<br />
+ by Edward Alfert</small></td></tr><!--#endif
-->
</table>
<p class="button"><a href="#select">Back to selection form</a></p>
-
+<!-- RT #902381 -->
<p id="openclipart">You can also find GNU-related public domain graphics at
<a href="https://openclipart.org/search/?query=GNU">openclipart.org</a>.</p>
@@ -1050,7 +1059,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 1996-2007, 2010, 2012-2018 Free Software Foundation,
Inc.</p>
+<p>Copyright © 1996-2007, 2010, 2012-2019 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -1060,7 +1069,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/12/15 14:46:13 $
+$Date: 2019/03/13 11:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: graphics/po/philosophicalgnu.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/philosophicalgnu.es-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- graphics/po/philosophicalgnu.es-en.html 14 Feb 2019 11:31:12 -0000
1.11
+++ graphics/po/philosophicalgnu.es-en.html 13 Mar 2019 11:00:58 -0000
1.12
@@ -52,8 +52,8 @@
https://web.archive.org/web/20090224214409/http://ngc224.gerwinski.de/~anja/gnuart/markus/index.html
-->
<p>This image is available under the <a rel="license"
-href="/licenses/gpl.html">GNU General Public License</a>, version 2 or
-any later version.</p>
+href="/licenses/old-licenses/gpl-2.0.html">GNU General Public License</a>,
+version 2 or any later version.</p>
</div>
</div>
@@ -98,7 +98,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/14 11:31:12 $
+$Date: 2019/03/13 11:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: graphics/po/reiss-gnuhead.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/reiss-gnuhead.es-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- graphics/po/reiss-gnuhead.es-en.html 26 Feb 2019 11:30:02 -0000
1.15
+++ graphics/po/reiss-gnuhead.es-en.html 13 Mar 2019 11:00:58 -0000
1.16
@@ -38,8 +38,8 @@
<p>Copyright © 2000 Free Software Foundation, Inc.</p>
<p>This image is available under the <a rel="license"
-href="/licenses/gpl.html">GNU General Public License</a>, version 2 or
-any later version, or the <a rel="license"
+href="/licenses/old-licenses/gpl-2.0.html">GNU General Public License</a>,
+version 2 or any later version, or the <a rel="license"
href="https://directory.fsf.org/wiki/License:Free-Art-L-v1.3">Free Art
License</a>.</p>
@@ -95,7 +95,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/26 11:30:02 $
+$Date: 2019/03/13 11:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: graphics/po/usegnu.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/usegnu.es-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- graphics/po/usegnu.es-en.html 15 Dec 2018 14:46:13 -0000 1.13
+++ graphics/po/usegnu.es-en.html 13 Mar 2019 11:00:58 -0000 1.14
@@ -1,43 +1,58 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.86 -->
-<title>Use 'GNU - GNU Project - Free Software Foundation</title>
+<!-- Parent-version: 1.87 -->
+<title>Use 'GNU by Etienne Suvasa and FSF Staff - GNU Project - Free Software
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/graphics/graphics.css"
media="print,screen" />
+<style type="text/css" media="print,screen"><!--
+.reduced-width { width: 55em; }
address@hidden (min-width: 43em) {
+ #navigation li#more-links, #back-to-top { display: none; }
+}
+--></style>
<!--#include virtual="/graphics/po/usegnu.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Use 'GNU</h2>
-<p>
-<a href="/graphics/use-gnu-sm.jpg"><img src="/graphics/use-gnu-sm.jpg"
- alt=" [Pseudo-Lisp (Use 'GNU)] "
- width="139" height="111" /></a>
-</p>
+<p class="byline">by Etienne Suvasa and the FSF Staff</p>
+
+<div class="reduced-width">
+<div class="pict narrow">
+ <a href="/graphics/use-gnu.jpg"><img
+ src="/graphics/use-gnu.jpg"
+ alt=" [Pseudo-Lisp (Use 'GNU)] " /></a>
+</div>
-<p>
-“GNU's Not Unix” curves above, and “Free Software
+<p>“GNU's Not Unix” curves above, and “Free Software
Foundation” borders below in this Lisp-like statement about GNU. Two
“parentheses” formed by curved, dancing GNUs form a pseudo-Lisp
-program: (USE 'GNU).
-</p>
+program: (USE 'GNU).</p>
-<p>
-The dancing GNU parentheses were drawn by Etienne Suvasa. They are
+<p>The dancing GNU parentheses were drawn by Etienne Suvasa; they are
part of the cover art for the
-<a href="/manual/manual.html#emacs">GNU
+<a href="https://shop.fsf.org/collection/books-docs">GNU
Emacs Lisp Reference manual</a>.
-</p>
+The rest was designed by the FSF staff for the 1996
+<a href="https://shop.fsf.org/collection/gnu-gear#Tshirts">GNU t-shirt</a>.</p>
-<p>
-The rest of this art was designed by the FSF staff for the 1996
-<a href="/order/t-shirts.html">GNU T-shirt</a>.
-</p>
-
-<p>
-This picture is available in the following formats:
-</p>
<ul>
- <li>jpeg <a href="/graphics/use-gnu-sm.jpg">6k</a>, <a
href="/graphics/use-gnu.jpg">17k</a></li>
- <li>png <a href="/graphics/use-gnu-sm.png">2k</a>, <a
href="/graphics/use-gnu.png">5k</a></li>
+ <li>JPEG
+ <a href="/graphics/use-gnu-sm.jpg">4kB</a> (139x111),
+ <a href="/graphics/use-gnu.jpg">16kB</a> (331x264)</li>
+ <li>PNG
+ <a href="/graphics/use-gnu-sm.png">1.3kB</a> (139x111),
+ <a href="/graphics/use-gnu.png">4kB</a> (331x264)</li>
</ul>
+<div id="license" class="infobox">
+<hr />
+<p>Copyright © 1998 Etienne Suvasa (dansing parentheses)<br />
+ Copyright © 1998 Free Software Foundation, Inc. (text)</p>
+
+<p>This image is available under the <a rel="license"
+href="https://creativecommons.org/licenses/by-sa/4.0/">Creative
+Commons Attribution-ShareAlike 4.0 International License</a>.</p>
+</div>
+</div>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -68,34 +83,18 @@
of this article.</p>
</div>
-<!-- Regarding copyright, in general, standalone pages (as opposed to
- files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 4.0. Please do NOT change or remove this
- without talking with the webmasters or licensing team first.
- Please make sure the copyright date is consistent with the
- document. For web pages, it is ok to list just the latest year the
- document was modified, or published.
-
- If you wish to list earlier years, that is ok too.
- Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
- years, as long as each year in the range is in fact a copyrightable
- year, i.e., a year in which the document was published (including
- being publicly visible on the web or in a revision control system).
-
- There is more detail about copyright years in the GNU Maintainers
- Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright © 2014, 2015, 2018 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
-Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+<!-- Please only list the latest year the page was modified. -->
+<p><em>Page text:</em>
+Copyright © 2019 Free Software Foundation, Inc.<br />
+Available under the <a rel="license"
+href="https://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribution-NoDerivatives 4.0 International License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/12/15 14:46:13 $
+$Date: 2019/03/13 11:00:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/de.po 11 Mar 2019 10:02:10 -0000 1.48
+++ proprietary/po/de.po 13 Mar 2019 11:00:58 -0000 1.49
@@ -3959,6 +3959,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/es.po 11 Mar 2019 11:01:58 -0000 1.64
+++ proprietary/po/es.po 13 Mar 2019 11:00:58 -0000 1.65
@@ -2754,6 +2754,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/fr.po 11 Mar 2019 10:33:04 -0000 1.85
+++ proprietary/po/fr.po 13 Mar 2019 11:00:59 -0000 1.86
@@ -3145,6 +3145,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/it.po 11 Mar 2019 10:02:10 -0000 1.48
+++ proprietary/po/it.po 13 Mar 2019 11:00:59 -0000 1.49
@@ -3746,6 +3746,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/ja.po 11 Mar 2019 10:02:10 -0000 1.48
+++ proprietary/po/ja.po 13 Mar 2019 11:00:59 -0000 1.49
@@ -3200,6 +3200,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/malware-cars.de-diff.html 4 Feb 2019 07:31:22 -0000
1.25
+++ proprietary/po/malware-cars.de-diff.html 13 Mar 2019 11:00:59 -0000
1.26
@@ -75,6 +75,17 @@
worse.</p>
</li>
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
+ </li>
+
<li id="M201810230">
<p>GM <a
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
@@ -156,9 +167,9 @@
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
Volkswagen programmed its car engine computers</strong></del></span> <span
class="inserted"><ins><em>weak security, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
- is easy</em></ins></span> to <span
class="removed"><del><strong>detect</strong></del></span> <span
class="inserted"><ins><em>open</em></ins></span> the
-<span class="removed"><del><strong>Environmental Protection Agency's emission
tests</a>,
-and run dirty the rest</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> of <span
class="removed"><del><strong>the time.</p>
+ is easy</em></ins></span> to <span class="removed"><del><strong>detect the
+Environmental Protection Agency's emission tests</a>,
+and run dirty</strong></del></span> <span
class="inserted"><ins><em>open</em></ins></span> the <span
class="removed"><del><strong>rest</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> of <span
class="removed"><del><strong>the time.</p>
<p>In real driving, the</strong></del></span> <span
class="inserted"><ins><em>100 million</em></ins></span> cars <span
class="removed"><del><strong>exceeded emissions standards</strong></del></span>
<span class="inserted"><ins><em>built</em></ins></span> by <span
class="removed"><del><strong>a factor
of up to 35.</p>
@@ -173,7 +184,7 @@
DRM in</strong></del></span>
<span class="inserted"><ins><em><li id="M201607160">
- <p>Computerized</em></ins></span> cars <span
class="removed"><del><strong>will drive consumers
crazy</a>.</p></strong></del></span> <span
class="inserted"><ins><em>with nonfree software are <a
+ <p id="car-spying">Computerized</em></ins></span> cars <span
class="removed"><del><strong>will drive consumers
crazy</a>.</p></strong></del></span> <span
class="inserted"><ins><em>with nonfree software are <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p></em></ins></span>
</li>
@@ -372,7 +383,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/13 11:00:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/malware-cars.de.po 1 Jan 2019 20:00:35 -0000 1.15
+++ proprietary/po/malware-cars.de.po 13 Mar 2019 11:00:59 -0000 1.16
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -119,6 +119,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/malware-cars.fr.po 1 Jan 2019 22:19:49 -0000 1.23
+++ proprietary/po/malware-cars.fr.po 13 Mar 2019 11:00:59 -0000 1.24
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2019-01-01 23:19+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -97,6 +98,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/malware-cars.pot 1 Jan 2019 20:00:35 -0000 1.10
+++ proprietary/po/malware-cars.pot 13 Mar 2019 11:00:59 -0000 1.11
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a "
+"href=\"/proprietary/proprietary-surveillance.html#car-spying\"> "
+"manufacturers collect this data</a> as part of their own spying, then "
+"forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/malware-cars.ru.po 25 Feb 2019 09:37:05 -0000 1.29
+++ proprietary/po/malware-cars.ru.po 13 Mar 2019 11:00:59 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2018-09-27 04:21-0500\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -99,6 +100,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/nl.po 11 Mar 2019 10:02:10 -0000 1.48
+++ proprietary/po/nl.po 13 Mar 2019 11:00:59 -0000 1.49
@@ -2690,6 +2690,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/pl.po 11 Mar 2019 10:02:10 -0000 1.48
+++ proprietary/po/pl.po 13 Mar 2019 11:00:59 -0000 1.49
@@ -2258,6 +2258,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/pot 11 Mar 2019 10:02:10 -0000 1.48
+++ proprietary/po/pot 13 Mar 2019 11:00:59 -0000 1.49
@@ -2113,6 +2113,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-surveillance.de-diff.html 9 Mar 2019
17:02:55 -0000 1.53
+++ proprietary/po/proprietary-surveillance.de-diff.html 13 Mar 2019
11:00:59 -0000 1.54
@@ -2094,25 +2094,16 @@
<li id="M201702060">
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</em></ins></span> that <span
class="removed"><del><strong>the specific sabotage method Lenovo used
did</strong></del></span> <span class="inserted"><ins><em>is viewed on them,
and</em></ins></span> not <span class="removed"><del><strong>affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>just broadcasts and
- cable</a>. Even if the image</em></ins></span> is <span
class="inserted"><ins><em>coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were</em></ins></span> not <span
class="removed"><del><strong>really
+ report everything</em></ins></span> that <span
class="removed"><del><strong>the specific sabotage method Lenovo used did not
affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
is <span class="inserted"><ins><em>viewed on them, and</em></ins></span> not
<span class="removed"><del><strong>really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>hidden as it
was</em></ins></span> in <span class="removed"><del><strong>its own
malware</a>.
+puts in its</strong></del></span> <span class="inserted"><ins><em>just
broadcasts and
+ cable</a>. Even if the image is coming from the
user's</em></ins></span> own <span
class="removed"><del><strong>malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>these TVs,
- does not legitimize the surveillance.</p>
- </li>
-
- <li id="M201511130">
- <p>Some web and TV advertisements play inaudible
- sounds</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>be picked up by
proprietary malware running</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2122,33 +2113,20 @@
<ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>other
devices in range so as to determine that they
- are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
- </li>
-
- <li id="M201511060">
- <p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers</em></ins></span>
can <span class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
- across devices.</p>
-
- <p>It is possible to turn</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>off, but having</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>computer,</em></ins></span>
+ the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>TV reports what
it is. The existence</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>a way to disable the
+ surveillance, even if</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>enabled by default
- is an injustice already.</p></em></ins></span>
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -2157,410 +2135,437 @@
</div>
<ul>
- <li><p>Spyware in Skype:
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>were not hidden as it was</em></ins></span> in <span
class="removed"><del><strong>Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
- already monitors. Tivo customers are unaware they're
- being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these TVs,
+ does not legitimize the surveillance.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<!-- #SpywareOnTheRoad -->
<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span
class="removed"><del><strong>place</strong></del></span> new <span
class="removed"><del><strong>items on top under each subsection -->
+
+ <span class="inserted"><ins><em><li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>be picked up by proprietary malware
running</em></ins></span>
+ on <span class="removed"><del><strong>The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>other devices</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
<ul>
<li>
- <p>Every “home security” camera,</strong></del></span>
<span class="inserted"><ins><em>combined surveillance by default.</p>
- </li>
-
- <li id="M201507240">
- <p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even</em></ins></span> if <span
class="removed"><del><strong>its manufacturer can communicate with it,
- is</strong></del></span> <span class="inserted"><ins><em>it
isn't</em></ins></span> a <span class="removed"><del><strong>surveillance
device.</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
- </li>
-
- <li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a
+ <p>Every “home security” camera, if its
manufacturer</strong></del></span> <span class="inserted"><ins><em>range so as
to determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>communicate</strong></del></span> <span
class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="removed"><del><strong>it,
+ is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>Web activity, and other</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
<p>The article describes wrongdoing by the manufacturer,
based</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops</em></ins></span> on <span class="removed"><del><strong>the fact
- that the device is tethered</strong></del></span> <span
class="inserted"><ins><em>what programs people watch, and even what they
wanted</em></ins></span> to
- <span class="inserted"><ins><em>record</a>.</p>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p>
</li>
- <li id="M201504300">
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used</em></ins></span> a <span
class="removed"><del><strong>server.</p>
+ <li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers in spying</em></ins></span> on <span
class="removed"><del><strong>the fact</strong></del></span> <span
class="inserted"><ins><em>their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</em></ins></span> that <span
class="removed"><del><strong>the device</strong></del></span> <span
class="inserted"><ins><em>advertisers can track you
+ across devices.</p>
+
+ <p>It</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates</strong></del></span> <span
class="inserted"><ins><em>firmware “upgrade” to make its TVs snoop
on what
- users watch</a>. The TVs did not do</em></ins></span> that <span
class="removed"><del><strong>the device gives the company
- surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>when first sold.</p></em></ins></span>
+ <p>But</strong></del></span> <span class="inserted"><ins><em>turn
this off, but having</em></ins></span> it <span
class="removed"><del><strong>also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>enabled by default
+ is an injustice already.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>600 millions social
media profiles</em></ins></span> the company
+ <span class="inserted"><ins><em>already monitors. Tivo customers are
unaware they're
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
+ </li>
- <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is</strong></del></span> <span
class="inserted"><ins><em>Samsung “Smart” TV</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to</em></ins></span>
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>US or some
- other government.</p>
+ <span class="removed"><del><strong><li>
+ <p>The Nest Cam</strong></del></span>
- <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>using it</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ <span class="inserted"><ins><em><li id="M201507240">
+ <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs recognize and</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are</em></ins></span> watching</a>, <span
class="removed"><del><strong>even when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means the manufacturer is using it
to outsmart
you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
<span class="inserted"><ins><em>be trusted unless it is done by free
- software</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul>
<li><p>E-books can contain JavaScript code,
- and</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
+ and</strong></del></span> <span class="inserted"><ins><em>even if it isn't
a TV channel.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"></em></ins></span>
+ snoops on <span class="removed"><del><strong>readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report</strong></del></span> <span class="inserted"><ins><em>what
programs people watch, and</em></ins></span> even <span
class="removed"><del><strong>which page the user reads at</strong></del></span>
what <span class="removed"><del><strong>time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span> <span class="inserted"><ins><em>they
wanted</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
+ </li>
- <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
- parties</a>.</p></em></ins></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201504300">
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
+ users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no authentication when
+ accessed through the modem. However, even if it asked for
+ authentication, you couldn't be confident</strong></del></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The software in the car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables the phone company to track the car's movements all
+ the time; it is possible to physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>when first sold.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
- Kindle:</strong></del></span>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201502090">
+ <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
+ Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>invasion isn't done by malware.
The</strong></del></span> <span class="inserted"><ins><em>US or
some</em></ins></span>
+ other
+ <span class="removed"><del><strong>cases mentioned
are</strong></del></span> <span class="inserted"><ins><em>government.</p>
+
+ <p>Speech recognition is not to be trusted unless it
is</em></ins></span> done by <span class="removed"><del><strong>proprietary
malware</strong></del></span> <span class="inserted"><ins><em>free
+ software</em></ins></span> in <span class="removed"><del><strong>the
car.</p></li>
+
+ <li><p>Tesla cars allow the company to
extract</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
- <span class="inserted"><ins><em><li id="M201411090">
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span class="removed"><del><strong>user
reads at what</strong></del></span> time</a>.</p>
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</em></ins></span>
+ data <span class="removed"><del><strong>remotely and
+ determine</strong></del></span> <span
class="inserted"><ins><em>containing sensitive information will be transmitted
to third
+ parties</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,</strong></del></span>
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
+ <li id="M201409290">
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information,</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ <p>The report was as of 2014,</em></ins></span> but <span
class="removed"><del><strong>if the state orders it</strong></del></span> <span
class="inserted"><ins><em>we don't expect this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to
<span class="removed"><del><strong>Adobe</a>. Adobe's
“excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>get users'
formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ <p>This shows that laws requiring products</em></ins></span> to get
<span class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>users' formal
+ consent before collecting personal</em></ins></span> data
+ <span class="removed"><del><strong>and hand it
over,</strong></del></span> <span class="inserted"><ins><em>are totally
inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>state can store it.</p>
</li>
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
+<div style="clear: left;"></div>
<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>tracking, the TV
will not
+ <li><p>Lots of “smart”
products</strong></del></span> <span class="inserted"><ins><em>tracking, the TV
will not
work.”</p>
<p>Proper laws would say that TVs</em></ins></span> are
- <span class="removed"><del><strong><a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>not allowed to report what the
- user watches—no exceptions!</p></em></ins></span>
+ <span class="removed"><del><strong>designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</strong></del></span> <span class="inserted"><ins><em>not
allowed</em></ins></span> to <span
class="removed"><del><strong>everyone</strong></del></span> <span
class="inserted"><ins><em>report what the
+ user watches—no exceptions!</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span> the <span
class="removed"><del><strong>system</strong></del></span> <span
class="inserted"><ins><em>switch to turn this off</em></ins></span> has
- no <span class="removed"><del><strong>authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>effect</a>. (The fact</em></ins></span> that
<span class="removed"><del><strong>Nissan has no
- access. The software in</strong></del></span> the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>transmission reports a 404 error
- really</em></ins></span> means <span class="removed"><del><strong>it
demands blind faith from its users</a>.</p>
+ <li id="M201405200">
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>LG
“smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>user watches, and the switch to turn this off has
+ no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables the phone company to track</strong></del></span> <span
class="inserted"><ins><em>nothing;</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>server could save that data anyway.)</p>
+ <p>Today's technological practice does not include any way of
+ making</strong></del></span> <span class="inserted"><ins><em>transmission
reports</em></ins></span> a <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>404 error
+ really means nothing; the server could save</em></ins></span> that <span
class="removed"><del><strong>can obey your voice commands without
+ potentially spying on you. Even if</strong></del></span> <span
class="inserted"><ins><em>data anyway.)</p>
- <p>Even worse, it <a
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>is air-gapped,</strong></del></span> <span
class="inserted"><ins><em><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ snoops on other devices on the user's local network</a>.</p>
- <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span> <span
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>stop this, but any
- product could spy this way.</p>
+ <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch to stop this, but any
+ product</em></ins></span> could <span class="removed"><del><strong>be
+ saving up records about you for later examination.</p>
+ </li>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p></em></ins></span>
+ <li><p>Nest thermometers
+ send</strong></del></span> <span class="inserted"><ins><em>spy this
way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots</em></ins></span> of <span class="removed"><del><strong>data about
the user</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>id="M201212170">
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span> <span class="inserted"><ins><em>break
security on</em></ins></span> a <span class="removed"><del><strong>matter of
proprietary surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a></em></ins></span>
- and <span class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>use its camera to watch</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned</strong></del></span> <span
class="inserted"><ins><em>people who</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware in the
car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>watching TV.</p>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>video they capture</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a>, which save it
+ send the video they capture</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
long-term.</p>
- <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>car's location</strong></del></span> <span
class="inserted"><ins><em>video shows everyone that comes near, or merely
+ <p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look</em></ins></span>
- at <span class="removed"><del><strong>any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information,</strong></del></span> <span
class="inserted"><ins><em>the videos freely. It appears Amazon has tried to
prevent that
- secondary abuse,</em></ins></span> but <span
class="removed"><del><strong>if</strong></del></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon gets the
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>how Ring used to let individual employees look
+ at</em></ins></span> the <span class="removed"><del><strong>other
way.” Evidently</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent</em></ins></span> that <span class="removed"><del><strong>was
+before</strong></del></span>
+ <span class="inserted"><ins><em>secondary abuse, but the primary
abuse—that</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of</em></ins></span> everything
<span class="inserted"><ins><em>they
see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="inserted"><ins><em>suggested that these
- manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in the videos. That's not
- security for your home. Security means making sure they
don't</em></ins></span> get <span class="inserted"><ins><em>to
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ security bugs</em></ins></span> that <span class="inserted"><ins><em>allow
anyone to watch through them</a>.</p>
</li>
<li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
+ <p>The Nest Cam “smart” camera</em></ins></span> is
<span class="removed"><del><strong>viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming
from</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span class="removed"><del><strong>data
- and hand</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
+ even when</em></ins></span> the <span class="removed"><del><strong>user's
own
+ computer,</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it
- to outsmart you.</p></em></ins></span>
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>is. The existence of a way</strong></del></span>
+ to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p>Lots of “smart” products are
- designed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes</em></ins></span> to <span
class="removed"><del><strong>everyone in</strong></del></span> the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
- into one.</p>
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not
hidden</strong></del></span> <span
class="inserted"><ins><em>product</em></ins></span> as <span
class="inserted"><ins><em>shipped doesn't act as a
+ listening device, remote changes to the code could surely
convert</em></ins></span> it
+ <span class="inserted"><ins><em>into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found to make <a
+ <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <span class="inserted"><ins><em><li id="M201703140">
+ <p>A computerized vibrator</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</em></ins></span> on <span class="removed"><del><strong>their
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its users through the proprietary control
app</a>.</p></em></ins></span>
- <p>Note</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ <p>The <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> was <span
class="removed"><del><strong>as</strong></del></span> <span
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
- <p>Today's technological practice does not include any way of
- making</strong></del></span> <span class="inserted"><ins><em>totally
inadequate proposed response:</em></ins></span> a <span
class="removed"><del><strong>device that can obey your voice commands without
- potentially spying on you. Even if it is air-gapped, it could be
- saving up records</strong></del></span> <span
class="inserted"><ins><em>labeling
- standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>you for later examination.</p>
- </li>
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
- <li><p>Nest thermometers
- send</strong></del></span> <span class="inserted"><ins><em>their
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made the vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>personal information</em></ins></span> about <span
class="inserted"><ins><em>how people
+ <p>The company</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+ consent before</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for</em></ins></span> collecting <span
class="inserted"><ins><em>lots of</em></ins></span> personal <span
class="removed"><del><strong>data are totally inadequate.
+ And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>information
about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing</em></ins></span>
the <span class="removed"><del><strong>user</a>.</p>
- </li>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>TV will
+ not work.”</p>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="removed"><del><strong>spy on their
renters</a>.</p>
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
+ user <span class="removed"><del><strong>watches — no
exceptions!</p>
</li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke: The other day</strong></del></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>data
- broker, the data broker would have been able</em></ins></span> to <span
class="removed"><del><strong>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see</strong></del></span> <span
class="inserted"><ins><em>figure</em></ins></span> out <span
class="inserted"><ins><em>who</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
+ <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>was.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span class="inserted"><ins><em>company has
been ordered to pay a total</em></ins></span> of <span
class="inserted"><ins><em>C$4m</a> to its
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a way to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>surveillance.</p></strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
- conversations was unacceptable by itself.</p></em></ins></span>
+ <p>That the manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>these
+ conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>default
+ is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>More or less
all</strong></del></span>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
<span class="inserted"><ins><em><li id="M201612060">
- <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span class="removed"><del><strong>get
users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>speech
recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>TV
- will say, “Without your consent to tracking,</strong></del></span>
<span class="inserted"><ins><em>U.S.</p>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
+ company based in</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This</em></ins></span>
would <span class="removed"><del><strong>say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>enable
- crackers</em></ins></span> to <span class="removed"><del><strong>report
what
- the user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes a step further than other TV
manufacturers</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> on
- <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>a child's speech,
and even speak into the
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>toys</em></ins></span> with <span
class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ going</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
</li>
</ul>
@@ -2573,12 +2578,19 @@
<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>turn this off, but having it enabled
by default</strong></del></span> <span class="inserted"><ins><em>snoop on other
people, DJI</em></ins></span> is <span class="removed"><del><strong>an
injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ to <span class="removed"><del><strong>be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>people, DJI is</em></ins></span> in
+ <span class="removed"><del><strong>range so as to determine that they
are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ </li>
+ <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>many
cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't a TV channel.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -2588,79 +2600,87 @@
<ul class="blurbs">
<li id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates</em></ins></span> with <span
class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>HP
servers</a></em></ins></span> to <span class="inserted"><ins><em>make
sure</em></ins></span> the <span class="removed"><del><strong>600 millions
social media profiles</strong></del></span> <span
class="inserted"><ins><em>user is still
- paying for</em></ins></span> the <span
class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>subscription,</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible sounds
to</strong></del></span> <span class="inserted"><ins><em>hasn't printed more
pages than were
+ communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>time</a>.</p>
+ </li>
+ <li><p>The Samsung “Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span class="inserted"><ins><em>user is
still
+ paying for</em></ins></span> the <span
class="removed"><del><strong>internet to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
paid for.</p>
- <p>Even though the ink subscription program may</em></ins></span> be
- <span class="removed"><del><strong>picked up by proprietary malware
running</strong></del></span> <span class="inserted"><ins><em>cheaper in some
- specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions</em></ins></span> in
- <span class="removed"><del><strong>range so</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases,</em></ins></span> it <span class="inserted"><ins><em>spies
on users,</em></ins></span> and <span class="inserted"><ins><em>involves
totally unacceptable
+ restrictions in the use of ink cartridges that</em></ins></span> would
<span class="removed"><del><strong>then have</strong></del></span> <span
class="inserted"><ins><em>otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
+ <p>Crackers found a way</em></ins></span> to
+ <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a> for them.</p>
+ turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such</em></ins></span> as <span
class="inserted"><ins><em>China or the US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell the product
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.
Once your
- Internet devices</strong></del></span> <span
class="inserted"><ins><em>country,
+ <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the US
+ <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span>
or <span class="removed"><del><strong>some other government.</p>
+ <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>cease</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done
+ by free software</strong></del></span> <span
class="inserted"><ins><em>sell the product</em></ins></span> in <span
class="removed"><del><strong>your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span> that <span class="inserted"><ins><em>country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>paired with your TV, advertisers can
- correlate ads with Web activity, and
- other</strong></del></span> <span class="inserted"><ins><em>probably
hackers too, but please</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <p>These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be
transmitted</strong></del></span>
<span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking” to mean “breaking
security”</a>.</p></em></ins></span>
+ “hacking”</em></ins></span> to
+ <span class="removed"><del><strong>third
parties</a>.</p></strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people</strong></del></span>
+ <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what
the</strong></del></span>
<span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over the Internet</a>.</p>
+ offers a gratis electronic toothbrush that snoops on its</em></ins></span>
user <span class="removed"><del><strong>watches, and</strong></del></span>
<span class="inserted"><ins><em>by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart” products</em></ins></span> are <span
class="removed"><del><strong>watching</a>,
- even</strong></del></span> <span class="inserted"><ins><em>designed <a
+ <p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
+ listen</em></ins></span> to <span class="removed"><del><strong>turn this
off has no effect. (The fact that</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the
+ <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>server
+ could save</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without potentially spying
- on you. Even</em></ins></span> if it <span
class="removed"><del><strong>isn't a TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>is
air-gapped, it could be saving up records
- about you for later examination.</p></em></ins></span>
+ a device</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices</strong></del></span> <span
class="inserted"><ins><em>can obey your voice commands without potentially
spying</em></ins></span>
+ on <span class="removed"><del><strong>the user's local
network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped,</em></ins></span> it
<span class="removed"><del><strong>had installed a patch to stop this, but any
product</strong></del></span> could <span class="removed"><del><strong>spy this
way.</p>
+
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>be saving up records
+ about you for later examination.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user</a>.</p></em></ins></span>
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>data about the
user</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201310260">
- <p><a
-
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="inserted"><ins><em>their renters</a>.</p>
+ <span class="inserted"><ins><em><li id="M201310260"></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>what programs</strong></del></span> <span
class="inserted"><ins><em>their renters</a>.</p>
</li>
</ul>
@@ -2674,12 +2694,10 @@
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p>
+ monitor how often</em></ins></span> people <span
class="removed"><del><strong>watch, and even</strong></del></span> <span
class="inserted"><ins><em>wear it</a>.</p>
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it and would then have to
- give</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="inserted"><ins><em>normal that companies
- monitor every aspect of what they do.</p>
+ <p>This will teach the sheeple to find it normal that companies
+ monitor every aspect of</em></ins></span> what they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
</ul>
@@ -2690,114 +2708,94 @@
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</em></ins></span> to <span class="removed"><del><strong>the
US or some other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ that connects to an unidentified site in China</a>.</p>
- <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>not to</strong></del></span> <span
class="inserted"><ins><em>a back door, but that could</em></ins></span> be
<span class="removed"><del><strong>trusted unless</strong></del></span> <span
class="inserted"><ins><em>a
- misunderstanding. However,</em></ins></span> it is <span
class="removed"><del><strong>done
- by free software in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms
- that</strong></del></span> <span class="inserted"><ins><em>certainly
surveillance, at least.</p>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
<li id="M201407090">
- <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to
- <span class="removed"><del><strong>third
parties</a>.</p></strong></del></span> <span
class="inserted"><ins><em>report its location to someone else and to transmit
conversations
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>transmit conversations
too</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
+<span class="removed"><del><strong><!-- #SpywareInGames
--></strong></del></span>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareInGames">Spyware in
Games</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInVehicles">Vehicles</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
- <li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what</strong></del></span>
+<ul>
+
+ <li>
+ <p>The driver</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201811300">
+ <p>In China, it is mandatory</em></ins></span> for <span
class="inserted"><ins><em>electric
+ cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>certain gaming keyboard</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,</em></ins></span>
+ to <span
class="removed"><del><strong>China</a>.</p></strong></del></span>
<span class="inserted"><ins><em>a government-run platform</a>. In
practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810230">
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>user
watches, and</strong></del></span> <span class="inserted"><ins><em>choices of
radio programs</a> in its
+ tracked the choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
<p>GM did not get users' consent, but it could have got that easily
by
- sneaking it into</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for some digital service
+ sneaking it into the contract that</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends
personal</strong></del></span> <span class="inserted"><ins><em>sign for some
digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>turn this off
has no effect. (The fact that the
- transmission reports a 404 error</strong></del></span> <span
class="inserted"><ins><em>you,
+ <p>The cars can also collect lots of other data: listening to you,
watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be
forbidden.</p>
-
- <p>But if you</em></ins></span> really <span
class="removed"><del><strong>means nothing;</strong></del></span> <span
class="inserted"><ins><em>want to be safe, we must make sure</em></ins></span>
the <span class="removed"><del><strong>server
- could save</strong></del></span> <span class="inserted"><ins><em>car's
- hardware cannot collect any of that data, or</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
+ phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>about them</strong></del></span> <span
class="inserted"><ins><em>collection should be forbidden.</p>
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
- is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ <p>But if you really want</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that
data.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
<span class="inserted"><ins><em><li id="M201711230">
- <p>AI-powered driving apps can <a
-
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></em></ins></span>
+ <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<!-- #SpywareInGames -->
-<div class="big-section">
- <h3 id="SpywareInGames">Spyware in Games</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
-
- <li>
- <p>The driver for a certain gaming keyboard</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607160">
- <p>Computerized cars with nonfree software are</em></ins></span>
<a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
- to China</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></em></ins></span>
+ <li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201602240">
+ <li id="M201602240">
<p id="nissan-modem">The Nissan Leaf has a built-in
- cell phone modem which allows effectively anyone to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about
them</strong></del></span> <span class="inserted"><ins><em>make changes in
various
+ cell phone modem which allows effectively anyone to <a
+ href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely</em></ins></span> and <span
class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
- </li>
-
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span> <span class="inserted"><ins><em>do because
the system has no authentication
- when accessed through the modem. However, even if it
asked</em></ins></span>
- for <span class="removed"><del><strong>companies,
and</strong></del></span> <span class="inserted"><ins><em>authentication, you
couldn't be confident that Nissan
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
has no access. The software in the car is proprietary, <a
href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
@@ -3292,7 +3290,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/09 17:02:55 $
+$Date: 2019/03/13 11:00:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary/po/proprietary-surveillance.de.po 9 Mar 2019 17:02:56
-0000 1.268
+++ proprietary/po/proprietary-surveillance.de.po 13 Mar 2019 11:00:59
-0000 1.269
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -4065,6 +4065,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.390
retrieving revision 1.391
diff -u -b -r1.390 -r1.391
--- proprietary/po/proprietary-surveillance.fr.po 9 Mar 2019 18:22:39
-0000 1.390
+++ proprietary/po/proprietary-surveillance.fr.po 13 Mar 2019 11:00:59
-0000 1.391
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2019-03-09 19:16+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3448,6 +3449,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/proprietary-surveillance.it-diff.html 9 Mar 2019
17:02:56 -0000 1.120
+++ proprietary/po/proprietary-surveillance.it-diff.html 13 Mar 2019
11:00:59 -0000 1.121
@@ -1131,245 +1131,114 @@
<p>This illustrates that making unauthorized copies of
nonfree</em></ins></span> software <span class="removed"><del><strong>industry
towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- is <span class="removed"><del><strong>doing this in</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>way that at least is visible and
- optional</a>. Not as bad as what the others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>cure</em></ins></span> for <span
class="removed"><del><strong>children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <p>Out, out, damned Spotify!</p></strong></del></span>
+ <span class="inserted"><ins><em>is not a cure for the injustice of nonfree
software. It may avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-
- <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by</strong></del></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
- users to say “I agree”. That is no excuse for
malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>use by
companies.</a></p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to</strong></del></span> the <span
class="removed"><del><strong>app developer</strong></del></span> <span
class="inserted"><ins><em>nasty thing,</em></ins></span> but <span
class="removed"><del><strong>did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>cannot make</em></ins></span> it <span
class="removed"><del><strong>to other companies. This shows the
- weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
- </li>
-</ul>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
+ <h4 id="SpywareInMobileApps">Mobile Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>nVidia's</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience</strong></del></span>
- <span class="inserted"><ins><em>library for building mobile apps, which
also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends</strong></del></span>
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
+ apps the user has
+ installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data <span
class="removed"><del><strong>about them</strong></del></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
- </li>
-
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902140"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit
- <span class="removed"><del><strong><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
- into the toys themselves.</p>
+ sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
+ data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android</em></ins></span> apps
<span class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li>
- <p>A computerized vibrator</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature</strong></del></span>
+ <li><p>Widely used</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
<span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
- body), as well as the vibration frequency.</p>
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
- <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ <p>Collecting hardware identifiers</em></ins></span> is in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="inserted"><ins><em>take action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>snooping
done by the phone company, and perhaps by</strong></del></span> <span
class="inserted"><ins><em>policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps</em></ins></span> have
- <span class="removed"><del><strong>checked and changed.</p>
-
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</strong></del></span> <span class="inserted"><ins><em>a
surveillance feature</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ recording all</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>users' actions</a></em></ins></span> in <span
class="inserted"><ins><em>interacting with</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>a
- data broker, the data broker would have been able</strong></del></span>
- <span class="inserted"><ins><em>be on Google Play had one or more
malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that used
to</em></ins></span>
+ be <span class="removed"><del><strong>distracted by the
question</strong></del></span> <span class="inserted"><ins><em>on Google Play
had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
+ stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them</em></ins></span> to <span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>phishing sites
that stole their credentials. Furthermore,</em></ins></span>
- the user <span class="removed"><del><strong>was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was
designed</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>potential risk because
- there is no easy way</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>knowing what they really
do.</p></em></ins></span>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there</em></ins></span> is no <span class="removed"><del><strong>excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
<span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span class="inserted"><ins><em>150 most popular
- gratis VPN apps in Google Play</em></ins></span> found <span
class="removed"><del><strong>a way to access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a>
due</em></ins></span> to <span class="removed"><del><strong>place new items on
top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span> <span class="inserted"><ins><em>their
- source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users. Other
technical flaws were
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used</em></ins></span> for <span
class="removed"><del><strong>use by
companies.</a></p></strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="inserted"><ins><em><a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>not
really
-clean since</strong></del></span> <span class="inserted"><ins><em>unfortunate
that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
- <li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ <li id="M201901050"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>what it will do
+ being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>users of what it will do
with the data.</p>
<p>I think that lawsuit is about a side issue. What the company does
@@ -1383,75 +1252,34 @@
</li>
<li id="M201812290">
- <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>gratis Android apps <a
+ <p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
-
- <p>Often</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span> <span
class="inserted"><ins><em>send the machine's “advertising ID,” so
that
- Facebook can correlate the data</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ report on the user's actions</em></ins></span> to
+ <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>obtains from the same machine via
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the</em></ins></span> data <span
class="inserted"><ins><em>it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>the app; others only say that the user is
+ the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
- account.</p></em></ins></span>
+ account.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is</strong></del></span>
<span class="inserted"><ins><em>Android</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location</em></ins></span> even when <span
class="inserted"><ins><em>users disable “location
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>other kinds of location
+ <p>There are other ways to turn off the other kinds of location
tracking, but most users will be tricked by the misleading
control.</p>
</li>
@@ -2044,35 +1872,74 @@
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ users</em></ins></span> to <span class="removed"><del><strong>the app
developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>new combined surveillance by default.</p>
</li>
<li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ what people are watching</a>, even if</em></ins></span> it <span
class="removed"><del><strong>to other companies. This shows the
+ weakness of the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201505290">
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
- </li>
- <li id="M201504300">
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about
them</strong></del></span> <span class="inserted"><ins><em>even what they
wanted</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201504300">
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade”</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information</strong></del></span> <span
class="inserted"><ins><em>make its TVs snoop</em></ins></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>what
+ users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Samsung “Smart” TV</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet</em></ins></span> to <span
class="inserted"><ins><em>another company, Nuance</a>.</em></ins></span>
+ Nuance <span class="removed"><del><strong>Communications</a>,
+ a speech recognition company based in the U.S.</p>
- <li id="M201502090">
- <p>The Samsung “Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A</strong></del></span> <span class="inserted"><ins><em>and would
then have to give it to the US or some
+ <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> can <span class="removed"><del><strong>remotely
control the toys with a mobile phone. This</strong></del></span> <span
class="inserted"><ins><em>save it and</em></ins></span> would
+ <span class="removed"><del><strong>enable crackers</strong></del></span>
<span class="inserted"><ins><em>then have to give it</em></ins></span> to <span
class="removed"><del><strong>listen in on a child's speech, and even speak
+ into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span class="inserted"><ins><em>US
or some
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
@@ -2081,178 +1948,255 @@
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
- parties</a>.</p>
+ parties</a>.</p></em></ins></span>
</li>
- <li id="M201411090">
- <p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201411090">
+ <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
+ snooping <span class="removed"><del><strong>on its users
through</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
- <p>More or less all</em></ins></span> “smart” <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>TVs <a
+ <p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ on their users</a>.</p></em></ins></span>
- <p>The report was as of 2014, but we don't expect this has got
+ <p>The <span class="removed"><del><strong>app</strong></del></span>
<span class="inserted"><ins><em>report</em></ins></span> was <span
class="removed"><del><strong>reporting the temperature</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect this has got
better.</p>
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p>
+ <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
+
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span>
the <span class="removed"><del><strong>vibrator</strong></del></span>
+ <span class="inserted"><ins><em>user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact that the transmission reports a 404 error
- really</em></ins></span> means <span
class="inserted"><ins><em>nothing;</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>server could save that data anyway.)</p>
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span class="removed"><del><strong>data
may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>user watches, and</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that the transmission
reports</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>404 error
+ really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data <span
class="removed"><del><strong>broker would have been able to figure out
+ who</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
- <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch to stop this, but any
- product could spy this way.</p>
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>way.</p>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
</li>
- <li id="M201212170">
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
+ Crackers</em></ins></span> found a way to <span
class="removed"><del><strong>access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span class="inserted"><ins><em>break
security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
+ and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
+
+
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span>
+<li><p></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>video</em></ins></span> they <span
class="removed"><del><strong>report even</strong></del></span> <span
class="inserted"><ins><em>capture to Amazon
servers</a>,</em></ins></span> which <span
class="removed"><del><strong>page</strong></del></span> <span
class="inserted"><ins><em>save it
+ send the video they capture to Amazon servers</a>, which save it
long-term.</p>
- <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>video
shows everyone that comes near, or merely
- passes by,</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
+ <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
- <p>The article focuses on how Ring</em></ins></span> used
- <span class="removed"><del><strong>by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>let
individual employees look
- at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>check DRM!</p>
- </li>
+ <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>let individual employees look</em></ins></span>
+ at <span class="removed"><del><strong>Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
</div>
+<div style="clear: left;"></div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>prevent that
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>the videos
freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
+ video—Amazon expects society to surrender to.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
+ <li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
- <p>That's easy to do because the system has no authentication when
- accessed through</strong></del></span>
+ <p>Specifically,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give</em></ins></span> the <span class="removed"><del><strong>modem.
However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera”
would</em></ins></span> be <span
class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>a better
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>these
- manufacturers promise not to look at what's</em></ins></span> in the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
- security for your home. Security</em></ins></span> means <span
class="removed"><del><strong>it demands blind faith from its
users</a>.</p>
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>suggested that these
+ manufacturers promise not to look at what's in</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
+ security for your home. Security means making sure</em></ins></span> they
<span class="removed"><del><strong>pass it</strong></del></span> <span
class="inserted"><ins><em>don't get to
+ see</em></ins></span> through <span
class="removed"><del><strong>Microsoft.</p></li>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>making sure they don't get</em></ins></span> to
- <span class="inserted"><ins><em>see through your camera.</p>
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>your camera.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
- <li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ <span class="inserted"><ins><em><li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
</li>
+</ul>
+
- <li id="M201511250">
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>watch
through them</a>.</p>
+ </li>
+
+ <li id="M201511250"></em></ins></span>
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
+ even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
- to <span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
- listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span>
- <span class="inserted"><ins><em>into one.</p>
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the</em></ins></span> code <span
class="removed"><del><strong>snoops on
readers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>could surely convert it
+ into one.</p></em></ins></span>
</li>
- <li id="M201711100">
- <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>make <a
+ <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ recordings of the conversation between two users</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping on its users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
@@ -2260,109 +2204,105 @@
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>drivers'
movements</a>,</strong></del></span> <span class="inserted"><ins><em>their
- products, rather than free software</em></ins></span> which <span
class="removed"><del><strong>is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>users could
have checked</em></ins></span>
- and
- <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article, is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>company that made the vibrator <a
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
+
+ <p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>privacy, and should</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
+ was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
- payment systems,</strong></del></span>
- <span class="inserted"><ins><em>true,</em></ins></span> but <span
class="inserted"><ins><em>it doesn't really matter. If it had
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>data to a data
- broker,</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out who the
- user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the company <span class="inserted"><ins><em>has been ordered to pay a
total of C$4m</a> to its
- customers.</p>
- </li>
-
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker,</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the
+ user <span class="removed"><del><strong>reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>pay a total
of C$4m</a></em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its
+ customers.</p></em></ins></span>
+ </li>
+
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
+ accessed through the modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in</strong></del></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
- manufacturer's snooping.</p>
+ Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>access</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>manufacturer and the FBI could
listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>store it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
- crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ company based in</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-<ul>
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>listen in on a child's speech, and even speak
into</em></ins></span> the <span class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span>
<span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and
+ <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
- to <span class="removed"><del><strong>me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
</ul>
@@ -2373,146 +2313,179 @@
</div>
<ul class="blurbs">
- <li id="M201902080">
- <p>The HP <a
+ <li id="M201902080"></em></ins></span>
+ <p>The <span class="removed"><del><strong>case</strong></del></span>
<span class="inserted"><ins><em>HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>constantly
- communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>coming from</strong></del></span> <span
class="inserted"><ins><em>still
- paying for</em></ins></span> the <span class="removed"><del><strong>user's
own
- computer,</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases,</em></ins></span> it <span
class="removed"><del><strong>is. The existence</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="inserted"><ins><em>ink cartridges that would otherwise be in
- working order.</p>
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
+ really</strong></del></span>
+ <span class="inserted"><ins><em>working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found</em></ins></span> a way to
- <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as it was in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
- </li>
-
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon
device,
- and</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
+ <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
- easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
-
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
+ <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done
by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>say no?</p>
+
+ <p>These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking” to mean “breaking
security”</a>.</p>
+ </li>
+
+ <li id="M201804140">
+ <p>A medical insurance</em></ins></span> company <span
class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
- across devices.</p>
+ <li id="M201706204">
+ <p>Lots of “smart” products are designed <a
+
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
- <p>It is possible to turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>snoops on its
user</em></ins></span> by <span class="removed"><del><strong>default
- is an injustice already.</p></strong></del></span>
- <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p></em></ins></span>
+ <p>Today's technological practice does not include any way of making
+ a device that</em></ins></span> can <span
class="removed"><del><strong>store it.</p>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
- <span class="inserted"><ins><em><li id="M201706204">
- <p>Lots of “smart” products are designed <a
-
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="inserted"><ins><em>everyone
in</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially
spying</em></ins></span>
+ on <span class="removed"><del><strong>top under each subsection -->
- <p>Today's technological practice does not include any way of making
- a device that</em></ins></span> can <span class="removed"><del><strong>now
<a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible sounds
to</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
- on you. Even if it is air-gapped, it could</em></ins></span> be
- <span class="removed"><del><strong>picked</strong></del></span> <span
class="inserted"><ins><em>saving</em></ins></span> up <span
class="removed"><del><strong>by proprietary malware
running</strong></del></span> <span class="inserted"><ins><em>records
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped, it could be saving up
records
about you for later examination.</p>
</li>
<li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send <a
+ <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
data about the user</a>.</p>
</li>
- <li id="M201310260">
- <p><a
+ <span
class="removed"><del><strong><li><p><a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201310260">
+ <p><a</em></ins></span>
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
- range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareOnWearables">Wearables</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer, the TV reports what it is. The existence of a way to
+ disable the surveillance, even if it were not hidden as it was in
+ these TVs, does not legitimize the surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart” TVs <a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not
allowed</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
- monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
+ monitor every aspect of</em></ins></span> what
+ <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>they do.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>Web activity, and
- other</strong></del></span> <span class="inserted"><ins><em>an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
+ that <span class="removed"><del><strong>advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
+ misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
<span class="inserted"><ins><em><li id="M201407090">
- <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize and</strong></del></span> <span
class="inserted"><ins><em>watch is designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't a TV channel.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
- too</a>.</p></em></ins></span>
+ <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>report its location to someone else</em></ins></span>
and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so as</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
+ too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2521,18 +2494,35 @@
</div>
<ul class="blurbs">
- <li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ </li>
+ <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits</strong></del></span>
<span class="inserted"><ins><em>choices of radio programs</a> in its
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810230">
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get</em></ins></span> users' <span
class="removed"><del><strong>voice on the internet to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
<p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
@@ -2588,7 +2578,7 @@
<li><p>Users</strong></del></span>
<span class="inserted"><ins><em><li id="M201607160">
- <p>Computerized cars with nonfree software</em></ins></span> are
<span class="removed"><del><strong>suing Bose for</strong></del></span> <a
+ <p id="car-spying">Computerized cars with nonfree
software</em></ins></span> are <span class="removed"><del><strong>suing Bose
for</strong></del></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
@@ -3060,7 +3050,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/09 17:02:56 $
+$Date: 2019/03/13 11:00:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- proprietary/po/proprietary-surveillance.it.po 9 Mar 2019 17:02:56
-0000 1.281
+++ proprietary/po/proprietary-surveillance.it.po 13 Mar 2019 11:00:59
-0000 1.282
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3820,6 +3820,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary/po/proprietary-surveillance.ja-diff.html 9 Mar 2019
17:02:56 -0000 1.130
+++ proprietary/po/proprietary-surveillance.ja-diff.html 13 Mar 2019
11:00:59 -0000 1.131
@@ -1272,98 +1272,47 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span>
+ <p>Specifically,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other
kinds</em></ins></span> of <span class="removed"><del><strong>Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>location
- tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ <li id="M201806110">
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
the user's movements and listens through the
microphone</a>.</p>
- <p>This makes them act as spies</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
-
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be</em></ins></span> sure <span
class="inserted"><ins><em>from the article.</p>
-
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>This makes them act as spies for licensing enforcement.</p>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ <p>I expect</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>article.</p>
-<ul>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
- <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span
class="inserted"><ins><em>one more.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
- <p>More than</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop
- and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>manufacturer is
using it</strong></del></span> <span class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p>
- </li>
-</ul>
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
+ of <span class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were
found to snoop
+ and collect information about its users</a>. 40%</em></ins></span>
of <span class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span class="inserted"><ins><em>the
apps were
+ found to insecurely snitch on its users. Furthermore,</em></ins></span>
they <span class="removed"><del><strong>pass it through
Microsoft.</p></li>
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
<span class="inserted"><ins><em>insecurely snitch on its users. Furthermore,
they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
and the proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
@@ -1392,7 +1341,7 @@
<li id="M201711240">
<p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers</em></ins></span>
can <span class="removed"><del><strong>contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em><a
+ is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
@@ -1417,8 +1366,8 @@
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
- <p>On the other hand, Google redistributes nonfree Android
apps,</em></ins></span> and
- <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice of their being
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
@@ -1995,87 +1944,86 @@
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"></em></ins></span>
- snoops on <span class="removed"><del><strong>readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>other
devices on</em></ins></span> the <span class="removed"><del><strong>e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ <p>Even worse, it <a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do</em></ins></span> lots of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p>
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
</li>
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>break
security on a “smart” TV</a>
- and use its camera</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
+ <li><p>Spyware in Skype:</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has a built-in cell phone
modem</strong></del></span>
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>,</em></ins></span>
which <span class="removed"><del><strong>allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>save it
+ send the video they capture to Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
- at</em></ins></span> the <span
class="removed"><del><strong>system</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon</em></ins></span>
has <span class="removed"><del><strong>no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>tried to prevent that
- secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon gets the
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera”
would</em></ins></span> be <span
class="removed"><del><strong>confident</strong></del></span> <span
class="inserted"><ins><em>a better
+ see</a>. “Home insecurity camera” would be a better
name!</p>
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>Nissan has no
- access. The software</strong></del></span> <span
class="inserted"><ins><em>these
- manufacturers promise not to look at what's</em></ins></span> in the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
<li id="M201603220">
@@ -2084,263 +2032,288 @@
security bugs that allow anyone to watch through them</a>.</p>
</li>
- <li id="M201511250">
- <p>The Nest Cam “smart” camera</em></ins></span> is
- <span class="removed"><del><strong>proprietary,</strong></del></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ <li id="M201511250"></em></ins></span>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device</em></ins></span> means <span
class="inserted"><ins><em>the manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
-
- <p>Even if no one connects</strong></del></span>
- to <span class="inserted"><ins><em>outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<ul class="blurbs">
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in
Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+</div>
+
+<span class="removed"><del><strong><ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
- listening device, remote changes</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span
class="removed"><del><strong>is possible</strong></del></span>
- <span class="inserted"><ins><em>into one.</p>
+ <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed</strong></del></span> <span class="inserted"><ins><em>code could
surely convert it
+ into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>make <a
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ recordings of the conversation between two users</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the</em></ins></span> proprietary <span
class="removed"><del><strong>surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>control app</a>.</p>
-
- <p>The app was reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> the <span
class="removed"><del><strong>invasion isn't done</strong></del></span> <span
class="inserted"><ins><em>vibrator minute</em></ins></span> by <span
class="removed"><del><strong>malware. The other
- cases mentioned are done</strong></del></span>
- <span class="inserted"><ins><em>minute (thus, indirectly, whether it was
surrounded</em></ins></span> by <span class="removed"><del><strong>proprietary
malware in</strong></del></span> <span class="inserted"><ins><em>a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>vibration frequency.</p>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
+ body), as well as the vibration frequency.</p>
- <p>Note</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>totally
inadequate proposed response: a labeling
+ <p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users could have
checked</em></ins></span>
- and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>changed.</p>
+ products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
+ and changed.</p>
- <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company
says</strong></del></span>
+ <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If</em></ins></span> it <span
class="removed"><del><strong>doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>had sold</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>a data
- broker,</em></ins></span> the data
- <span class="removed"><del><strong>and hand it
over,</strong></del></span> <span class="inserted"><ins><em>broker would have
been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
- </li>
-</ul>
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
+ <p>Even if no one connects to the car
remotely,</strong></del></span> <span class="inserted"><ins><em>was
anonymizing</em></ins></span> the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>data
may be
+ true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>time; it
is possible</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+ <li><p>Proprietary software in cars</strong></del></span>
<span class="inserted"><ins><em>user was.</p>
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its
- customers.</p></em></ins></span>
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span
class="inserted"><ins><em>pay</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>total</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m</a>
to its
+ customers.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-<p>Emo Phillips made a joke: The other day</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys with microphones <a
+ <li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>access the data</a> collected by the
- manufacturer's snooping.</p>
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
- <p>That the manufacturer</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently
that</strong></del></span> <span class="inserted"><ins><em>FBI could listen to
these
- conversations</em></ins></span> was
-<span class="removed"><del><strong>before Amazon “smart”
TVs.</p>
+ <li><p>Tesla cars allow</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
-<ul>
- <li><p>More or less all</strong></del></span> <span
class="inserted"><ins><em>unacceptable by itself.</p>
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span class="removed"><del><strong>get
users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>speech
recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>TV
- will say, “Without your consent to tracking,</strong></del></span>
<span class="inserted"><ins><em>U.S.</p>
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
+ company <span class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This</em></ins></span>
would <span class="removed"><del><strong>say that TVs are not
allowed</strong></del></span> <span class="inserted"><ins><em>enable
- crackers</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span class="inserted"><ins><em>listen in on a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span>
- <span class="inserted"><ins><em>toys themselves.</p>
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201502180">
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p></em></ins></span>
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul class="blurbs">
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>step further than</strong></del></span> <span
class="inserted"><ins><em>DJI drone
- to snoop on</em></ins></span> other <span class="removed"><del><strong>TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>people, DJI
is</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on
- <span class="removed"><del><strong>their users:
their</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201902080">
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>make sure the user is still
+ paying for the subscription,</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
paid for.</p>
- <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>detail</strong></del></span> <span
class="inserted"><ins><em>some
- specific cases, it spies on users,</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
- restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
- across devices.</p>
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart” TVs <a href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their users</a>.</p>
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>would otherwise be in
+ <p>The report was as</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
+
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>ink cartridges</em></ins></span> that <span
class="removed"><del><strong>laws requiring products</strong></del></span>
<span class="inserted"><ins><em>would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>break the security of an Amazon device,
- and <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"></em></ins></span>
- turn <span class="removed"><del><strong>this off, but
having</strong></del></span> it <span class="removed"><del><strong>enabled by
default
- is an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>into a
listening device</a> for them.</p>
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+
+ <p>It was very difficult for them</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
- <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>company already
- monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.</p>
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <li id="M201804140">
+ <span class="inserted"><ins><em><li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>other devices in
- range so as</strong></del></span> <span class="inserted"><ins><em>its
user by
+ offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>its user by
sending usage data back over the Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart” products are designed <a
+ <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>products are
designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>everyone in the house, all the
time</a>.</p>
+ listen to everyone</em></ins></span> in <span
class="removed"><del><strong>detail and
+ link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device</em></ins></span> that <span class="removed"><del><strong>they
are nearby. Once your
- Internet devices are paired with your TV,
advertisers</strong></del></span> can
- <span class="removed"><del><strong>correlate ads with Web activity, and
- other</strong></del></span> <span class="inserted"><ins><em>obey your
voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p>
+ a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
+ on you. Even if</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
- <li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
<span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about the user</a>.</p></em></ins></span>
+ data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
- <span class="inserted"><ins><em><li id="M201310260">
+ <li id="M201310260">
<p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
</li>
</ul>
@@ -2352,13 +2325,14 @@
<ul class="blurbs">
<li id="M201807260">
- <p>Tommy Hilfiger clothing</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often</em></ins></span> people <span
class="removed"><del><strong>are watching</a>,
- even if</strong></del></span> <span class="inserted"><ins><em>wear
it</a>.</p>
-
- <p>This will teach the sheeple to find</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>normal that companies
- monitor every aspect of what they do.</p>
+ <p>Tommy Hilfiger clothing <a
+
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
+ monitor how often people wear it</a>.</p>
+
+ <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
+ monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
</ul>
@@ -2367,24 +2341,24 @@
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>back door, but that could be a
+ <p>The article says this is a back door, but that could be a
misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
<span class="inserted"><ins><em><li id="M201407090">
- <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
+ <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize and</strong></del></span> <span
class="inserted"><ins><em>watch is designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to transmit conversations
- too</a>.</p></em></ins></span>
+ to report its location to someone else and to transmit conversations
+ too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2393,7 +2367,22 @@
</div>
<ul class="blurbs">
- <li id="M201810230">
+ <li id="M201811300">
+ <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
+ cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810230">
<p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
@@ -2424,7 +2413,7 @@
<span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201607160">
- <p>Computerized cars with nonfree software are</em></ins></span>
<a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ <p id="car-spying">Computerized cars with nonfree software
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
@@ -2888,7 +2877,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/09 17:02:56 $
+$Date: 2019/03/13 11:00:59 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary/po/proprietary-surveillance.ja.po 9 Mar 2019 17:02:56
-0000 1.254
+++ proprietary/po/proprietary-surveillance.ja.po 13 Mar 2019 11:00:59
-0000 1.255
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3234,6 +3234,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary/po/proprietary-surveillance.pot 9 Mar 2019 17:02:56 -0000
1.202
+++ proprietary/po/proprietary-surveillance.pot 13 Mar 2019 11:00:59 -0000
1.203
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2363,6 +2363,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a "
+"href=\"/proprietary/proprietary-surveillance.html#car-spying\"> "
+"manufacturers collect this data</a> as part of their own spying, then "
+"forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.487
retrieving revision 1.488
diff -u -b -r1.487 -r1.488
--- proprietary/po/proprietary-surveillance.ru.po 9 Mar 2019 18:05:21
-0000 1.487
+++ proprietary/po/proprietary-surveillance.ru.po 13 Mar 2019 11:00:59
-0000 1.488
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3408,6 +3409,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary.de-diff.html 11 Mar 2019 10:02:10 -0000
1.61
+++ proprietary/po/proprietary.de-diff.html 13 Mar 2019 11:01:00 -0000
1.62
@@ -45,10 +45,10 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -125,19 +125,19 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
+ </li>
+
<li id="M201903080">
<p>Malware installed into the processor in a hard drive could <a
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
@@ -272,25 +283,6 @@
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
-
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
- </li>
</ul></em></ins></span>
@@ -351,7 +343,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary.de.po 11 Mar 2019 10:02:10 -0000 1.103
+++ proprietary/po/proprietary.de.po 13 Mar 2019 11:01:00 -0000 1.104
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -563,27 +573,6 @@
"watch</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/proprietary.es.po 11 Mar 2019 10:30:48 -0000 1.120
+++ proprietary/po/proprietary.es.po 13 Mar 2019 11:01:00 -0000 1.121
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -298,6 +299,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -490,42 +501,6 @@
"que <a href=\"/proprietary/proprietary-surveillance.html#M201901100\">le "
"permite observar</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-"La base de datos AppCensus ofrece información de <a href=\"https://www."
-"appcensus.mobi\">cómo las aplicaciones de Android usan y abusan de los datos
"
-"personales del usuario</a>. Hasta marzo de 2019, se habÃan analizado casi "
-"78.000, de las cuales 24.000 (el 31%) transmitÃan el <a href=\"/proprietary/"
-"proprietary-surveillance.html#M201812290\">identificador publicitario</a> a "
-"otras compañÃas, y <a href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-"
-"behaving-badly/\">18.000 (el 23% del total) enlazaban este identificador con "
-"identificadores de hardware</a>, de modo que los usuarios no podÃan evitar "
-"el rastreo reiniciándolo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-"Recoger identificadores de hardware constituye una clara violación de las "
-"polÃticas de Google. Parece que Google no estaba enterada de ello, pero una "
-"vez informada tampoco se dio mucha prisa en actuar. Esto da prueba de que "
-"las polÃticas de una plataforma de desarrollo son ineficaces para evitar que
"
-"los desarrolladores de software no libre incluyan software malicioso en sus "
-"programas."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -605,6 +580,41 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The AppCensus database gives information on <a href=\"https://www."
+#~ "appcensus.mobi\"> how Android apps use and misuse users' personal data</"
+#~ "a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 "
+#~ "(31%) transmit the <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\"> Advertising ID</a> to other companies, and <a href="
+#~ "\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 "
+#~ "(23% of the total) link this ID to hardware identifiers</a>, so that "
+#~ "users cannot escape tracking by resetting it."
+#~ msgstr ""
+#~ "La base de datos AppCensus ofrece información de <a href=\"https://www."
+#~ "appcensus.mobi\">cómo las aplicaciones de Android usan y abusan de los "
+#~ "datos personales del usuario</a>. Hasta marzo de 2019, se habÃan "
+#~ "analizado casi 78.000, de las cuales 24.000 (el 31%) transmitÃan el <a "
+#~ "href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\">identificador publicitario</a> a otras compañÃas, y <a
"
+#~ "href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"
+#~ "\">18.000 (el 23% del total) enlazaban este identificador con "
+#~ "identificadores de hardware</a>, de modo que los usuarios no podÃan "
+#~ "evitar el rastreo reiniciándolo."
+
+#~ msgid ""
+#~ "Collecting hardware identifiers is in apparent violation of Google's "
+#~ "policies. But it seems that Google wasn't aware of it, and, once "
+#~ "informed, was in no hurry to take action. This proves that the policies "
+#~ "of a development platform are ineffective at preventing nonfree software "
+#~ "developers from including malware in their programs."
+#~ msgstr ""
+#~ "Recoger identificadores de hardware constituye una clara violación de las
"
+#~ "polÃticas de Google. Parece que Google no estaba enterada de ello, pero "
+#~ "una vez informada tampoco se dio mucha prisa en actuar. Esto da prueba de "
+#~ "que las polÃticas de una plataforma de desarrollo son ineficaces para "
+#~ "evitar que los desarrolladores de software no libre incluyan software "
+#~ "malicioso en sus programas."
+
+#~ msgid ""
#~ "Facebook offered a convenient proprietary library for building mobile "
#~ "apps, which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
#~ "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary/po/proprietary.fr.po 11 Mar 2019 10:33:05 -0000 1.147
+++ proprietary/po/proprietary.fr.po 13 Mar 2019 11:01:00 -0000 1.148
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2019-03-11 11:32+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -488,41 +499,6 @@
"proprietary-surveillance.html#M201901100\">lui permet, Ã elle, de regarder</"
"a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-"La base de données AppCensus donne des informations sur <a href=\"https://"
-"www.appcensus.mobi\">la manière dont chacune des applis Android use et abuse
"
-"des données personnelles de l'utilisateur</a>. Actuellement (en mars 2019), "
-"près de 78 000 applis ont été analysées, parmi lesquelles 24 000 (31%) "
-"transmettent l'<a href=\"/proprietary/proprietary-surveillance."
-"html#M201812290\">identifiant publicitaire</a> à des sociétés tierces et "
-"18 000 (23% du total) l'associent à des identifiants de l'appareil pour que
"
-"les utilisateurs ne puissent pas échapper au ciblage en le réinitialisant."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-"La collecte des identifiants de l'appareil viole apparemment les règles "
-"édictées par Google. Mais il semble que Google ne s'en soit pas rendu
compte "
-"et que, une fois informée, elle n'ait montré aucun empressement à prendre "
-"les mesures voulues. Cela prouve que les règles d'une plateforme de "
-"développement sont incapables d'empêcher les développeurs de logiciel non "
-"libre d'ajouter des fonctions malveillantes à leurs programmes."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -596,3 +572,37 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The AppCensus database gives information on <a href=\"https://www."
+#~ "appcensus.mobi\"> how Android apps use and misuse users' personal data</"
+#~ "a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 "
+#~ "(31%) transmit the <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\"> Advertising ID</a> to other companies, and <a href="
+#~ "\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 "
+#~ "(23% of the total) link this ID to hardware identifiers</a>, so that "
+#~ "users cannot escape tracking by resetting it."
+#~ msgstr ""
+#~ "La base de données AppCensus donne des informations sur <a
href=\"https://"
+#~ "www.appcensus.mobi\">la manière dont chacune des applis Android use et "
+#~ "abuse des données personnelles de l'utilisateur</a>. Actuellement (en "
+#~ "mars 2019), près de 78 000 applis ont été analysées, parmi lesquelles
"
+#~ "24Â 000 (31%) transmettent l'<a href=\"/proprietary/proprietary-"
+#~ "surveillance.html#M201812290\">identifiant publicitaire</a> Ã des "
+#~ "sociétés tierces et 18 000 (23% du total) l'associent à des
identifiants "
+#~ "de l'appareil pour que les utilisateurs ne puissent pas échapper au "
+#~ "ciblage en le réinitialisant."
+
+#~ msgid ""
+#~ "Collecting hardware identifiers is in apparent violation of Google's "
+#~ "policies. But it seems that Google wasn't aware of it, and, once "
+#~ "informed, was in no hurry to take action. This proves that the policies "
+#~ "of a development platform are ineffective at preventing nonfree software "
+#~ "developers from including malware in their programs."
+#~ msgstr ""
+#~ "La collecte des identifiants de l'appareil viole apparemment les règles "
+#~ "édictées par Google. Mais il semble que Google ne s'en soit pas rendu "
+#~ "compte et que, une fois informée, elle n'ait montré aucun empressement Ã
"
+#~ "prendre les mesures voulues. Cela prouve que les règles d'une plateforme "
+#~ "de développement sont incapables d'empêcher les développeurs de
logiciel "
+#~ "non libre d'ajouter des fonctions malveillantes à leurs programmes."
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary.it-diff.html 11 Mar 2019 10:02:10 -0000
1.73
+++ proprietary/po/proprietary.it-diff.html 13 Mar 2019 11:01:00 -0000
1.74
@@ -46,13 +46,13 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -184,6 +184,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
+ </li>
+
<li id="M201903080">
<p>Malware installed into the processor in a hard drive could <a
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
@@ -271,25 +282,6 @@
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
-
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
- </li>
</ul></em></ins></span>
@@ -350,7 +342,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary/po/proprietary.it.po 11 Mar 2019 10:02:10 -0000 1.112
+++ proprietary/po/proprietary.it.po 13 Mar 2019 11:01:00 -0000 1.113
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -567,27 +577,6 @@
"watch</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary.ja-diff.html 11 Mar 2019 10:02:10 -0000
1.74
+++ proprietary/po/proprietary.ja-diff.html 13 Mar 2019 11:01:00 -0000
1.75
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -157,10 +157,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -181,6 +181,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
+ </li>
+
<li id="M201903080">
<p>Malware installed into the processor in a hard drive could <a
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
@@ -268,25 +279,6 @@
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
-
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
- </li>
</ul></em></ins></span>
@@ -347,7 +339,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary/po/proprietary.ja.po 11 Mar 2019 10:02:10 -0000 1.95
+++ proprietary/po/proprietary.ja.po 13 Mar 2019 11:01:00 -0000 1.96
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -487,27 +497,6 @@
"watch</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary.nl-diff.html 11 Mar 2019 10:02:10 -0000
1.73
+++ proprietary/po/proprietary.nl-diff.html 13 Mar 2019 11:01:00 -0000
1.74
@@ -46,13 +46,13 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -184,6 +184,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
+ </li>
+
<li id="M201903080">
<p>Malware installed into the processor in a hard drive could <a
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
@@ -271,25 +282,6 @@
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
-
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
- </li>
</ul></em></ins></span>
@@ -350,7 +342,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/proprietary.nl.po 11 Mar 2019 10:02:10 -0000 1.84
+++ proprietary/po/proprietary.nl.po 13 Mar 2019 11:01:00 -0000 1.85
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -560,27 +570,6 @@
"watch</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary.pl-diff.html 11 Mar 2019 10:02:10 -0000
1.91
+++ proprietary/po/proprietary.pl-diff.html 13 Mar 2019 11:01:00 -0000
1.92
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
+ </li>
+
<li id="M201903080">
<p>Malware installed into the processor in a hard drive could <a
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
@@ -269,25 +280,6 @@
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
-
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
- </li>
</ul></em></ins></span>
@@ -348,7 +340,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary/po/proprietary.pl.po 11 Mar 2019 10:02:10 -0000 1.79
+++ proprietary/po/proprietary.pl.po 13 Mar 2019 11:01:00 -0000 1.80
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -642,27 +652,6 @@
"watch</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/proprietary.pot 11 Mar 2019 10:02:10 -0000 1.76
+++ proprietary/po/proprietary.pot 13 Mar 2019 11:01:00 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a "
+"href=\"/proprietary/proprietary-surveillance.html#car-spying\"> "
+"manufacturers collect this data</a> as part of their own spying, then "
+"forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a "
"href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find\">
"
"use the disk itself as a microphone to detect speech</a>."
@@ -375,28 +386,6 @@
"to watch</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a "
-"href=\"https://www.appcensus.mobi\"> how Android apps use and misuse users' "
-"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
-"which 24,000 (31%) transmit the <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201812290\"> Advertising "
-"ID</a> to other companies, and <a "
-"href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> "
-"18,000 (23% of the total) link this ID to hardware identifiers</a>, so that "
-"users cannot escape tracking by resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/proprietary.pt-br.po 12 Mar 2019 14:31:29 -0000 1.107
+++ proprietary/po/proprietary.pt-br.po 13 Mar 2019 11:01:00 -0000 1.108
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2019-03-12 09:30-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -292,6 +293,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -482,41 +493,6 @@
"design que <a href=\"/proprietary/proprietary-surveillance."
"html#M201901100\"> permite que a Amazon assista</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-"O banco de dados do AppCensus fornece informações sobre <a href=\"https://"
-"www.appcensus.mobi\"> como os aplicativos de Android usam e fazem mau uso "
-"dos dados pessoais dos usuários</a>. Até março de 2019, quase 78.000 foram
"
-"analisados, dos quais 24.000 (31%) transmitem o <a href=\"/proprietary/"
-"proprietary-surveillance.html#M201812290\"> <i lang=\"en\">Advertising ID</"
-"i></a> para outras empresas e <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18.000 (23% do total) vinculam "
-"esse ID a identificadores de hardware</a>, para que os usuários não possam "
-"escapar do rastreamento redefinindo-o."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-"A coleta de identificadores de hardware está em aparente violação das "
-"polÃticas do Google. Mas parece que o Google não estava ciente disso e, uma
"
-"vez informada, não estava com pressa de agir. Isso prova que as polÃticas
de "
-"uma plataforma de desenvolvimento são ineficazes para evitar que "
-"desenvolvedores de software não livres incluam malware em seus programas."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -592,6 +568,40 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "The AppCensus database gives information on <a href=\"https://www."
+#~ "appcensus.mobi\"> how Android apps use and misuse users' personal data</"
+#~ "a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 "
+#~ "(31%) transmit the <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\"> Advertising ID</a> to other companies, and <a href="
+#~ "\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 "
+#~ "(23% of the total) link this ID to hardware identifiers</a>, so that "
+#~ "users cannot escape tracking by resetting it."
+#~ msgstr ""
+#~ "O banco de dados do AppCensus fornece informações sobre <a
href=\"https://"
+#~ "www.appcensus.mobi\"> como os aplicativos de Android usam e fazem mau uso "
+#~ "dos dados pessoais dos usuários</a>. Até março de 2019, quase 78.000 "
+#~ "foram analisados, dos quais 24.000 (31%) transmitem o <a href=\"/"
+#~ "proprietary/proprietary-surveillance.html#M201812290\"> <i lang=\"en"
+#~ "\">Advertising ID</i></a> para outras empresas e <a href=\"https://blog."
+#~ "appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18.000 (23% do total) "
+#~ "vinculam esse ID a identificadores de hardware</a>, para que os usuários "
+#~ "não possam escapar do rastreamento redefinindo-o."
+
+#~ msgid ""
+#~ "Collecting hardware identifiers is in apparent violation of Google's "
+#~ "policies. But it seems that Google wasn't aware of it, and, once "
+#~ "informed, was in no hurry to take action. This proves that the policies "
+#~ "of a development platform are ineffective at preventing nonfree software "
+#~ "developers from including malware in their programs."
+#~ msgstr ""
+#~ "A coleta de identificadores de hardware está em aparente violação das "
+#~ "polÃticas do Google. Mas parece que o Google não estava ciente disso e, "
+#~ "uma vez informada, não estava com pressa de agir. Isso prova que as "
+#~ "polÃticas de uma plataforma de desenvolvimento são ineficazes para
evitar "
+#~ "que desenvolvedores de software não livres incluam malware em seus "
+#~ "programas."
+
+#~ msgid ""
#~ "On-line gambling services (and their nonfree client programs) are <a href="
#~ "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-"
#~ "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary/po/proprietary.ru.po 11 Mar 2019 11:31:53 -0000 1.181
+++ proprietary/po/proprietary.ru.po 13 Mar 2019 11:01:00 -0000 1.182
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -489,41 +500,6 @@
"пÑогÑаммÑ, коÑоÑое <a
href=\"/proprietary/proprietary-surveillance."
"html#M201901100\">позволÑÐµÑ Amazon ÑмоÑÑеÑÑ ÑеÑез
камеÑÑ</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-"Ðаза даннÑÑ
AppCensus ÑодеÑÐ¶Ð¸Ñ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
Ñом, как <a href=\"https://www."
-"appcensus.mobi\"> пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android иÑполÑзÑÑÑ
пеÑÑоналÑнÑе даннÑе "
-"полÑзоваÑелей и злоÑпоÑÑеблÑÑÑ Ð¸Ð¼Ð¸</a>. Ðа
маÑÑ 2019 года "
-"пÑоанализиÑовано около 78 ÑÑÑÑÑ
пÑиложений, из коÑоÑÑÑ
24 ÑÑÑÑÑи (31%) <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201812290\">пеÑедаÑÑ
"
-"ÑекламнÑй иденÑиÑикаÑоÑ</a> в дÑÑгие
компании, а <a href=\"https://blog."
-"appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18 ÑÑÑÑÑ (23%
вÑеÑ
"
-"пÑиложений) ÑвÑзÑваÑÑ ÑÑÐ¾Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑоÑ
Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑоÑами аппаÑаÑÑÑÑ</a>, "
-"Ñак ÑÑо ÑбÑÐ¾Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑоÑа не позволÑеÑ
полÑзоваÑелÑм избежаÑÑ Ñлежки."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-"Ð¡Ð±Ð¾Ñ Ð°Ð¿Ð¿Ð°ÑаÑнÑÑ
иденÑиÑикаÑоÑов Ñвно
наÑÑÑÐ°ÐµÑ Ð¿Ñавила Google. Ðо в Google об "
-"ÑÑом как бÑдÑо не знали, а когда им
ÑообÑили, они не ÑпеÑили Ñ Ð¾ÑвеÑнÑми "
-"дейÑÑвиÑми. ÐÑо доказÑваеÑ, ÑÑо пÑавила
плаÑÑоÑÐ¼Ñ ÑазÑабоÑки ÑакÑиÑеÑки не "
-"пÑепÑÑÑÑвÑÑÑ ÑазÑабоÑÑикам неÑвободнÑÑ
пÑогÑамм закладÑваÑÑ Ð²ÑедоноÑнÑе "
-"ÑÑнкÑии в иÑ
пÑогÑаммÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -603,6 +579,40 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The AppCensus database gives information on <a href=\"https://www."
+#~ "appcensus.mobi\"> how Android apps use and misuse users' personal data</"
+#~ "a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 "
+#~ "(31%) transmit the <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\"> Advertising ID</a> to other companies, and <a href="
+#~ "\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 "
+#~ "(23% of the total) link this ID to hardware identifiers</a>, so that "
+#~ "users cannot escape tracking by resetting it."
+#~ msgstr ""
+#~ "Ðаза даннÑÑ
AppCensus ÑодеÑÐ¶Ð¸Ñ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
Ñом, как <a href=\"https://"
+#~ "www.appcensus.mobi\"> пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android иÑполÑзÑÑÑ
пеÑÑоналÑнÑе даннÑе "
+#~ "полÑзоваÑелей и злоÑпоÑÑеблÑÑÑ Ð¸Ð¼Ð¸</a>.
Ðа маÑÑ 2019 года "
+#~ "пÑоанализиÑовано около 78 ÑÑÑÑÑ
пÑиложений, из коÑоÑÑÑ
24 ÑÑÑÑÑи (31%) <a "
+#~
"href=\"/proprietary/proprietary-surveillance.html#M201812290\">пеÑедаÑÑ
"
+#~ "ÑекламнÑй иденÑиÑикаÑоÑ</a> в дÑÑгие
компании, а <a href=\"https://blog."
+#~ "appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18 ÑÑÑÑÑ (23%
вÑеÑ
"
+#~ "пÑиложений) ÑвÑзÑваÑÑ ÑÑоÑ
иденÑиÑикаÑÐ¾Ñ Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑоÑами
аппаÑаÑÑÑÑ</"
+#~ "a>, Ñак ÑÑо ÑбÑÐ¾Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑоÑа не
позволÑÐµÑ Ð¿Ð¾Ð»ÑзоваÑелÑм избежаÑÑ "
+#~ "Ñлежки."
+
+#~ msgid ""
+#~ "Collecting hardware identifiers is in apparent violation of Google's "
+#~ "policies. But it seems that Google wasn't aware of it, and, once "
+#~ "informed, was in no hurry to take action. This proves that the policies "
+#~ "of a development platform are ineffective at preventing nonfree software "
+#~ "developers from including malware in their programs."
+#~ msgstr ""
+#~ "Ð¡Ð±Ð¾Ñ Ð°Ð¿Ð¿Ð°ÑаÑнÑÑ
иденÑиÑикаÑоÑов Ñвно
наÑÑÑÐ°ÐµÑ Ð¿Ñавила Google. Ðо в Google "
+#~ "об ÑÑом как бÑдÑо не знали, а когда им
ÑообÑили, они не ÑпеÑили Ñ "
+#~ "оÑвеÑнÑми дейÑÑвиÑми. ÐÑо доказÑваеÑ,
ÑÑо пÑавила плаÑÑоÑÐ¼Ñ ÑазÑабоÑки "
+#~ "ÑакÑиÑеÑки не пÑепÑÑÑÑвÑÑÑ
ÑазÑабоÑÑикам неÑвободнÑÑ
пÑогÑамм
закладÑваÑÑ "
+#~ "вÑедоноÑнÑе ÑÑнкÑии в иÑ
пÑогÑаммÑ."
+
+#~ msgid ""
#~ "Facebook offered a convenient proprietary library for building mobile "
#~ "apps, which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
#~ "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/proprietary.zh-tw-diff.html 11 Mar 2019 10:02:10 -0000
1.51
+++ proprietary/po/proprietary.zh-tw-diff.html 13 Mar 2019 11:01:00 -0000
1.52
@@ -45,10 +45,10 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -125,19 +125,19 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811300">
+ <p>In China, it is mandatory for electric
+ cars to be equipped with a terminal that <a
+ href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
+ manufacturers collect this data</a> as part of their own spying, then
+ forward it to the government-run platform.</p>
+ </li>
+
<li id="M201903080">
<p>Malware installed into the processor in a hard drive could <a
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
@@ -272,25 +283,6 @@
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
-
- <li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
- href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
-
- <p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
- </li>
</ul></em></ins></span>
@@ -351,7 +343,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary.zh-tw.po 11 Mar 2019 10:02:10 -0000 1.62
+++ proprietary/po/proprietary.zh-tw.po 13 Mar 2019 11:01:00 -0000 1.63
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Malware installed into the processor in a hard drive could <a href=\"https://"
"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -476,27 +486,6 @@
"watch</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus."
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/pt-br.po 12 Mar 2019 14:31:29 -0000 1.63
+++ proprietary/po/pt-br.po 13 Mar 2019 11:01:00 -0000 1.64
@@ -2286,6 +2286,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/po/ru.po 11 Mar 2019 11:16:37 -0000 1.109
+++ proprietary/po/ru.po 13 Mar 2019 11:01:00 -0000 1.110
@@ -3126,6 +3126,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
@@ -7182,10 +7192,10 @@
"listening-devices-researchers-find\"> use the disk itself as a microphone to "
"detect speech</a>."
msgstr ""
-"ÐÑедоноÑнÑе пÑогÑаммÑ, ÑÑÑановленнÑе в
пÑоÑеÑÑоÑе жеÑÑкого диÑка, могли Ð±Ñ <a
href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> иÑполÑзоваÑÑ Ñам
диÑка как микÑоÑон, ÑÑÐ¾Ð±Ñ "
-"обнаÑÑживаÑÑ ÑеÑÑ</a>."
+"ÐÑедоноÑнÑе пÑогÑаммÑ, ÑÑÑановленнÑе в
пÑоÑеÑÑоÑе жеÑÑкого диÑка, могли Ð±Ñ "
+"<a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
+"turned-into-listening-devices-researchers-find\"> иÑполÑзоваÑÑ
Ñам диÑка как "
+"микÑоÑон, ÑÑÐ¾Ð±Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑ ÑеÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -7194,8 +7204,8 @@
"require changing Linux itself."
msgstr ""
"ÐÑа ÑÑаÑÑÑ ÑÑÑлаеÑÑÑ Ð½Ð° “опеÑаÑионнÑÑ
ÑиÑÑÐµÐ¼Ñ Linux”, но имееÑÑÑ "
-"в Ð²Ð¸Ð´Ñ <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. ÐÑоÑ
ÑÑÑк не поÑÑебовал "
-"Ð±Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹ в Ñамом Linux."
+"в Ð²Ð¸Ð´Ñ <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. ÐÑоÑ
ÑÑÑк не "
+"поÑÑебовал Ð±Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹ в Ñамом Linux."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/zh-tw.po 11 Mar 2019 10:02:11 -0000 1.48
+++ proprietary/po/zh-tw.po 13 Mar 2019 11:01:00 -0000 1.49
@@ -2216,6 +2216,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
"tracked the choices of radio programs</a> in its “connected” "
"cars, minute by minute."
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www graphics/graphics.es.html graphics/philosop...,
GNUN <=