[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Thu, 28 Mar 2019 05:02:23 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/03/28 05:02:21
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.493&r2=1.494
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.54&r2=1.55
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- de.po 28 Mar 2019 08:32:45 -0000 1.54
+++ de.po 28 Mar 2019 09:02:19 -0000 1.55
@@ -7427,6 +7427,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- es.po 28 Mar 2019 08:32:45 -0000 1.72
+++ es.po 28 Mar 2019 09:02:19 -0000 1.73
@@ -5675,6 +5675,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- fr.po 28 Mar 2019 08:32:45 -0000 1.95
+++ fr.po 28 Mar 2019 09:02:19 -0000 1.96
@@ -6015,6 +6015,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- it.po 28 Mar 2019 08:32:45 -0000 1.54
+++ it.po 28 Mar 2019 09:02:19 -0000 1.55
@@ -6979,6 +6979,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- ja.po 28 Mar 2019 08:32:45 -0000 1.54
+++ ja.po 28 Mar 2019 09:02:19 -0000 1.55
@@ -5954,6 +5954,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-mobiles.de-diff.html 17 Mar 2019 10:32:40 -0000 1.46
+++ malware-mobiles.de-diff.html 28 Mar 2019 09:02:19 -0000 1.47
@@ -336,58 +336,43 @@
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
WhatsApp messages are not entirely deleted</a>. They can be
recovered</em></ins></span>
- in <span class="removed"><del><strong>user's address
- book to developer's server. Note that this article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>various ways.</p></em></ins></span>
+ in <span class="inserted"><ins><em>various ways.</p>
</li>
- <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607280">
- <p>A half-blind security critique</em></ins></span> of <span
class="removed"><del><strong>data to China</a>.</p></li>
-
-<li>
- <p>Facebook's app listens all the time,</strong></del></span> <span
class="inserted"><ins><em>a tracking app: it found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
- blatant flaws allowed anyone to</em></ins></span> snoop on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>a user's personal data</a>.
- The critique fails entirely</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
- advertisements.</p>
-</li>
-
-
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security
- of 283 Android VPN apps concluded</strong></del></span> <span
class="inserted"><ins><em>express concern</em></ins></span> that <span
class="removed"><del><strong>“in spite of</strong></del></span> the
- <span class="removed"><del><strong>promises for privacy, security, and
anonymity given by</strong></del></span> <span class="inserted"><ins><em>app
sends</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span>
- <span class="inserted"><ins><em>personal data</em></ins></span> to <span
class="removed"><del><strong>poor security guarantees</strong></del></span>
<span class="inserted"><ins><em>a server, where the
<em>developer</em> gets it all.
+ <li id="M201607280">
+ <p>A half-blind security critique of a tracking app: it found that
<a
+
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+ blatant flaws allowed anyone to snoop on a</em></ins></span> user's <span
class="removed"><del><strong>address
+ book</strong></del></span> <span class="inserted"><ins><em>personal
data</a>.
+ The critique fails entirely</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>express concern</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> the
<span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>app
sends the
+ personal data</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>a
server, where the <em>developer</em> gets it all.
This “service” is for suckers!</p>
- <p>The server surely has a “privacy
policy,”</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
- VPN apps.”</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>surely
- it</em></ins></span> is <span class="inserted"><ins><em>worthless since
nearly all of them are.</p>
+ <p>The server surely has a “privacy policy,” and surely
+ it is worthless since nearly all of them are.</p></em></ins></span>
</li>
- <li id="M201607190">
- <p>A bug in</em></ins></span> a <span
class="removed"><del><strong>non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>proprietary ASN.1 library, used
- in cell phone towers as well as cell phones and routers, <a
-
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+ <span class="removed"><del><strong><li><p>Some
portable</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607190">
+ <p>A bug in a proprietary ASN.1 library, used
+ in cell phone towers as well as cell</em></ins></span> phones <span
class="inserted"><ins><em>and routers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control</em></ins></span> of <span class="inserted"><ins><em>those
systems</a>.</p>
</li>
<li id="M201603100">
- <p>Many</em></ins></span> proprietary <span
class="removed"><del><strong>VPN</strong></del></span> <span
class="inserted"><ins><em>payment</em></ins></span> apps <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Many proprietary payment apps <a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
- personal data in an insecure way</a>. However,</em></ins></span>
- the <span class="removed"><del><strong>research
paper</strong></del></span> <span class="inserted"><ins><em>worse aspect of
these apps is</em></ins></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em><a
- href="/philosophy/surveillance-vs-democracy.html">payment is not
+ personal</em></ins></span> data <span class="removed"><del><strong>to
China</a>.</p></li>
+
+<li>
+ <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>in an insecure way</a>.
However,</em></ins></span>
+ the <span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>worse aspect of these apps is that</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">payment
is not
anonymous</a>.</p>
</li>
@@ -395,28 +380,33 @@
<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
- your personal data on remote servers</a>. This leaves personal
- information like email addresses, passwords,</em></ins></span> and <span
class="removed"><del><strong>infringes the privacy</strong></del></span> <span
class="inserted"><ins><em>health information
- vulnerable. Because many</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant</strong></del></span> <span class="inserted"><ins><em>these apps
are proprietary it makes it
- hard</em></ins></span> to <span class="removed"><del><strong>track users
and show them</strong></del></span> <span class="inserted"><ins><em>impossible
to know which apps are at risk.</p>
+ your personal data</em></ins></span> on <span
class="removed"><del><strong>what people</strong></del></span> <span
class="inserted"><ins><em>remote servers</a>. This leaves personal
+ information like email addresses, passwords, and health information
+ vulnerable. Because many of these apps</em></ins></span> are <span
class="removed"><del><strong>listening to or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>proprietary</em></ins></span> it <span
class="removed"><del><strong>may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>makes it
+ hard</em></ins></span> to <span class="removed"><del><strong>serve them
with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>impossible to know which apps are at
risk.</p></em></ins></span>
</li>
- <li id="M201405190">
+
+<span class="removed"><del><strong><li>
+ <p>A</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405190">
<p>An app to prevent “identity theft”
- (access to personal data) by storing users' data on a special server <a
-
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
- deactivated by its developer</a> which had discovered a security
- flaw.</p>
+ (access to personal data) by storing users' data on a special
server</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy
and</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+ deactivated by its developer</a> which had discovered
a</em></ins></span> security
+ <span class="removed"><del><strong>of 283 Android VPN apps
concluded</strong></del></span>
+ <span class="inserted"><ins><em>flaw.</p>
<p>That developer seems to be conscientious about protecting personal
- data from third parties in general, but it can't protect that data
- from the state. Quite the contrary: confiding your data to someone
+ data from third parties in general, but it can't protect</em></ins></span>
that <span class="removed"><del><strong>“in spite
of</strong></del></span> <span class="inserted"><ins><em>data
+ from</em></ins></span> the
+ <span class="removed"><del><strong>promises for privacy, security, and
anonymity given by</strong></del></span> <span class="inserted"><ins><em>state.
Quite</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject
+ to</strong></del></span> <span class="inserted"><ins><em>contrary:
confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your rights.</p>
</li>
@@ -494,6 +484,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -786,17 +788,21 @@
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject to poor security
+ apps—millions of users may be unawarely subject to</em></ins></span>
poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
+ <p>Following is a non-exhaustive <span
class="removed"><del><strong>list</strong></del></span> <span
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+ of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN
apps <span class="removed"><del><strong>from
+ the research paper</strong></del></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="removed"><del><strong>infringes the privacy of
+ users:</p>
+
+ <dl></strong></del></span> <span class="inserted"><ins><em>infringe
their
privacy:</p>
- <dl class="compact">
+ <dl class="compact"></em></ins></span>
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them</em></ins></span> targeted
ads.</dd>
+ meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
@@ -888,38 +894,38 @@
to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
tens of thousands</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude.</a></p></strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
- it can alter them too</a>.</p></em></ins></span>
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601130">
- <p>Apps that include</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ <li id="M201601130">
+ <p>Apps</em></ins></span> that <span
class="removed"><del><strong>collude.</a></p></strong></del></span>
<span class="inserted"><ins><em>include <a
+
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>that install the app</a>.</p>
-
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p></em></ins></span>
</li>
- <li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this
point,</strong></del></span> <span class="inserted"><ins><em>make sure they
can't “fool”
- the monitoring</a>.</p>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601110">
+ <p>The natural extension of monitoring
+ people through “their” phones is</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't
“fool”</em></ins></span>
+ the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated to the app's functionality, was <a
+ unrelated to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
+ found in</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not enough
+to legitimize actions like this. At this point,</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
<p>The article should not</em></ins></span> have
<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>described these apps as
@@ -1295,7 +1301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:40 $
+$Date: 2019/03/28 09:02:19 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.de.po 17 Mar 2019 10:32:40 -0000 1.103
+++ malware-mobiles.de.po 28 Mar 2019 09:02:19 -0000 1.104
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -798,6 +798,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-mobiles.es.po 18 Mar 2019 09:57:48 -0000 1.112
+++ malware-mobiles.es.po 28 Mar 2019 09:02:19 -0000 1.113
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -687,6 +688,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-mobiles.fr.po 17 Mar 2019 16:01:34 -0000 1.133
+++ malware-mobiles.fr.po 28 Mar 2019 09:02:19 -0000 1.134
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2019-03-17 17:00+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -688,6 +689,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- malware-mobiles.it-diff.html 17 Mar 2019 10:32:40 -0000 1.51
+++ malware-mobiles.it-diff.html 28 Mar 2019 09:02:19 -0000 1.52
@@ -364,13 +364,10 @@
modem that tells big brother all the time where</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>is. If you own
such a car, it would</em></ins></span> be <span
class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span
class="inserted"><ins><em>wise</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>disconnect the modem so as to turn
- off the tracking.</p></em></ins></span>
+ off the tracking.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701270">
+ <li id="M201701270">
<p>Samsung phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
@@ -521,6 +518,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -804,10 +813,13 @@
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ massive surveillance.</p></em></ins></span>
</li>
- <li id="M201611160"></em></ins></span>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -840,7 +852,8 @@
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
<span class="removed"><del><strong>may turn them over to the UK government if
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ may <span class="removed"><del><strong>turn them over to the UK
government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -893,8 +906,7 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span class="inserted"><ins><em>may turn them over to</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
@@ -1322,7 +1334,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:40 $
+$Date: 2019/03/28 09:02:19 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.it.po 17 Mar 2019 10:32:40 -0000 1.103
+++ malware-mobiles.it.po 28 Mar 2019 09:02:19 -0000 1.104
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -767,6 +767,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.ja-diff.html 17 Mar 2019 10:32:40 -0000 1.65
+++ malware-mobiles.ja-diff.html 28 Mar 2019 09:02:19 -0000 1.66
@@ -214,11 +214,18 @@
<ul>
<li>
-<span class="removed"><del><strong><p>Many proprietary payment
apps</strong></del></span>
- <span class="inserted"><ins><em><p>See above for
the</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
-transmit personal data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">general universal back
- door</a> in essentially all mobile phones, which permits converting
+<span class="removed"><del><strong><p>Many proprietary payment apps <a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
+transmit personal data in an insecure way</a>.
+However,</strong></del></span>
+ <span class="inserted"><ins><em><p>See above for</em></ins></span>
the <span class="removed"><del><strong>worse aspect of these apps is
that</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
+</p>
+</li>
+
+ <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">general universal back
+ door</a></em></ins></span> in <span
class="removed"><del><strong>smart</strong></del></span> <span
class="inserted"><ins><em>essentially all mobile</em></ins></span> phones,
<span class="removed"><del><strong>including iPhones, Android, and
+ BlackBerry</a>. While there</strong></del></span> <span
class="inserted"><ins><em>which permits converting
them into full-time listening devices.</p>
</li>
</ul>
@@ -227,18 +234,11 @@
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door</em></ins></span> in <span
class="removed"><del><strong>an insecure way</a>.
-However,</strong></del></span> the <span class="removed"><del><strong>worse
aspect of these apps</strong></del></span> <span
class="inserted"><ins><em>application processor, for Xiaomi's
+ a universal back door in the application processor, for Xiaomi's
use</a>.</p>
- <p>This</em></ins></span> is <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>separate from</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
-</p>
-</li>
-
- <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the
- universal back door</em></ins></span> in <span
class="removed"><del><strong>smart phones, including iPhones, Android, and
- BlackBerry</a>. While there is not much detail here, it
seems</strong></del></span> <span class="inserted"><ins><em>the modem
processor</em></ins></span> that <span class="removed"><del><strong>this
+ <p>This</em></ins></span> is <span class="removed"><del><strong>not
much detail here, it seems</strong></del></span> <span
class="inserted"><ins><em>separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor</em></ins></span> that <span
class="removed"><del><strong>this
does not operate via</strong></del></span> the <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em>local phone
company can use</a>.</p>
</li>
@@ -328,9 +328,7 @@
<p>This is in addition</em></ins></span> to <span
class="inserted"><ins><em>the fact that the car contains</em></ins></span> a
<span class="removed"><del><strong>server, where</strong></del></span> <span
class="inserted"><ins><em>cellular
modem that tells big brother all</em></ins></span> the <span
class="removed"><del><strong><em>developer</em>
gets</strong></del></span> <span class="inserted"><ins><em>time
where</em></ins></span> it <span class="removed"><del><strong>all.
-This “service” is for suckers!</p>
-
-<p>The server surely</strong></del></span> <span
class="inserted"><ins><em>is. If you own
+This “service” is for suckers!</p></strong></del></span>
<span class="inserted"><ins><em>is. If you own
such a car, it would be wise to disconnect the modem so as to turn
off the tracking.</p>
</li>
@@ -367,9 +365,9 @@
blatant flaws allowed anyone to snoop on a user's personal data</a>.
The critique fails entirely to express concern that the app sends the
personal data to a server, where the <em>developer</em> gets
it all.
- This “service” is for suckers!</p>
+ This “service” is for suckers!</p></em></ins></span>
- <p>The server surely</em></ins></span> has a “privacy
policy,” and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>surely
+ <p>The server surely has a “privacy policy,” and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>surely
it is worthless since nearly all of them are.</p>
</li>
@@ -486,6 +484,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -1167,7 +1177,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:40 $
+$Date: 2019/03/28 09:02:19 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-mobiles.ja.po 17 Mar 2019 10:32:40 -0000 1.91
+++ malware-mobiles.ja.po 28 Mar 2019 09:02:19 -0000 1.92
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -636,6 +636,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-mobiles.pot 17 Mar 2019 10:32:40 -0000 1.69
+++ malware-mobiles.pot 28 Mar 2019 09:02:19 -0000 1.70
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -467,6 +467,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" "
+"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows\">
"
+"send sensitive personal data to third parties</a>, which can use it for "
+"invasive advertising or discriminating against people in poor health "
+"condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, "
+"“consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a "
"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\"> "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- malware-mobiles.ru.po 18 Mar 2019 06:31:57 -0000 1.167
+++ malware-mobiles.ru.po 28 Mar 2019 09:02:19 -0000 1.168
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -678,6 +679,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- nl.po 28 Mar 2019 08:32:45 -0000 1.54
+++ nl.po 28 Mar 2019 09:02:19 -0000 1.55
@@ -4741,6 +4741,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- pl.po 28 Mar 2019 08:32:46 -0000 1.54
+++ pl.po 28 Mar 2019 09:02:19 -0000 1.55
@@ -4185,6 +4185,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- pot 28 Mar 2019 08:32:46 -0000 1.54
+++ pot 28 Mar 2019 09:02:19 -0000 1.55
@@ -4008,6 +4008,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-surveillance.de-diff.html 26 Mar 2019 10:33:48 -0000
1.56
+++ proprietary-surveillance.de-diff.html 28 Mar 2019 09:02:19 -0000
1.57
@@ -943,6 +943,18 @@
</div>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -3337,7 +3349,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/26 10:33:48 $
+$Date: 2019/03/28 09:02:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary-surveillance.de.po 26 Mar 2019 10:33:48 -0000 1.271
+++ proprietary-surveillance.de.po 28 Mar 2019 09:02:19 -0000 1.272
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1867,6 +1867,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- proprietary-surveillance.fr.po 26 Mar 2019 18:11:47 -0000 1.396
+++ proprietary-surveillance.fr.po 28 Mar 2019 09:02:20 -0000 1.397
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2019-03-26 19:10+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1406,6 +1407,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary-surveillance.it-diff.html 26 Mar 2019 10:33:48 -0000
1.123
+++ proprietary-surveillance.it-diff.html 28 Mar 2019 09:02:20 -0000
1.124
@@ -1174,65 +1174,76 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>nVidia's</strong></del></span>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience</strong></del></span>
- <span class="inserted"><ins><em>library for building mobile apps, which
also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data <span
class="removed"><del><strong>about them</strong></del></span> to
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends</strong></del></span> <span
class="inserted"><ins><em>href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive</em></ins></span> personal data <span
class="removed"><del><strong>about them</strong></del></span> to
<span class="removed"><del><strong>nVidia servers</a>.</p>
</li>
<li><p>Angry Birds
<a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
- way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ spies</strong></del></span> <span class="inserted"><ins><em>third
parties</a>, which can use it</em></ins></span>
+ for <span class="removed"><del><strong>companies, and the NSA takes
advantage to spy through</strong></del></span> <span
class="inserted"><ins><em>invasive advertising or discriminating against people
in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought,</em></ins></span>
it <span class="removed"><del><strong>too</a>.
Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>Facebook as well.</p>
-
- <p>It shows that no one can trust a nonfree program, not even the
- developers of other nonfree programs.</p></em></ins></span>
+ More about NSA app spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>is buried</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
- <li></strong></del></span>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span class="inserted"><ins><em>lengthy terms of service that are
difficult</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201902140"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit
- <span class="removed"><del><strong><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em><a
- href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
- into the toys themselves.</p>
+ <li id="M201902230">
+ <p>Facebook offered</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
+
+ <p>Those toys</strong></del></span> <span
class="inserted"><ins><em>convenient proprietary
+ library for building mobile apps, which</em></ins></span> also <span
class="removed"><del><strong>contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>toys with a mobile phone.
This</strong></del></span> <span class="inserted"><ins><em>personal
+ data they collected</em></ins></span> would
+ <span class="removed"><del><strong>enable crackers</strong></del></span>
<span class="inserted"><ins><em>go</em></ins></span> to <span
class="removed"><del><strong>listen in on</strong></del></span> <span
class="inserted"><ins><em>Facebook as well.</p>
+
+ <p>It shows that no one can trust</em></ins></span> a <span
class="removed"><del><strong>child's speech, and</strong></del></span> <span
class="inserted"><ins><em>nonfree program, not</em></ins></span> even <span
class="removed"><del><strong>speak
+ into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
</li>
- <li>
- <p>A computerized vibrator</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator
+ <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p></strong></del></span>
- <p>The app was reporting the temperature</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ <span class="inserted"><ins><em><li id="M201902140"></em></ins></span>
+ <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking</em></ins></span> by
<span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
@@ -1254,62 +1265,75 @@
<p>Many nonfree apps</em></ins></span> have
<span class="removed"><del><strong>checked and changed.</p>
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</strong></del></span> <span class="inserted"><ins><em>a
surveillance feature</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span class="removed"><del><strong>data
to</strong></del></span> <span class="inserted"><ins><em>app.</p>
+ <p>The company that made the vibrator</strong></del></span> <span
class="inserted"><ins><em>a surveillance feature for</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used to
+ <p>Twenty nine “beauty camera” apps
that</em></ins></span> used <span
class="removed"><del><strong>it</a>.</p>
+
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>to
be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them was designed to make uninstallation
+ them to phishing sites</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>data may be
+ true,</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
+ haven't yet,</em></ins></span> but <span class="removed"><del><strong>it
doesn't</strong></del></span> <span class="inserted"><ins><em>they should also
stay away from nonfree apps in
general. <em>All</em> nonfree apps carry a potential risk
because
- there is no easy way of knowing what they really do.</p>
+ there is no easy way of knowing what they</em></ins></span> really <span
class="removed"><del><strong>matter. If it had sold</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
<li id="M201902010">
- <p>An investigation of the 150 most popular
+ <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>150 most popular
gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
+ potentially also be used</em></ins></span> to <span
class="inserted"><ins><em>spy on users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+ <p>Moreover,</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>data broker
would</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps</em></ins></span> have <span class="removed"><del><strong>been able to
figure out
+ who the user was.</p>
+
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>lousy privacy policies</a>.</p>
<p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
</li>
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
- with the data.</p>
-
- <p>I think that lawsuit is about a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+ stored users' locations to</em></ins></span> the <span
class="inserted"><ins><em>company's server</a>. The</em></ins></span>
company <span class="removed"><del><strong>has been ordered to pay a
total</strong></del></span> <span class="inserted"><ins><em>is
+ being sued, demanding that it notify the users</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
+ to its customers.</p>
+ </li>
+
+ <li><p> “CloudPets” toys</strong></del></span> <span
class="inserted"><ins><em>what it will do</em></ins></span>
+ with <span class="removed"><del><strong>microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>way to access</strong></del></span> <span
class="inserted"><ins><em>side issue. What</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>manufacturer
and</strong></del></span> <span class="inserted"><ins><em>data is a secondary
issue. The principal wrong here is that</em></ins></span>
+ the <span class="removed"><del><strong>FBI could listen
to</strong></del></span> <span class="inserted"><ins><em>company gets that data
at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1368,14 +1392,17 @@
of the 5,855 Android apps studied by researchers were found to snoop
and collect information about its users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+ detect only some methods of snooping, in</em></ins></span> these <span
class="removed"><del><strong>conversations
+ was unacceptable</strong></del></span> <span
class="inserted"><ins><em>proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ Android</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
and the proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
@@ -1918,8 +1945,7 @@
</li>
<li id="M201511060">
- <p>Vizio goes</em></ins></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>step further than other TV
+ <p>Vizio goes a step further than other TV
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
@@ -1932,7 +1958,7 @@
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span class="removed"><del><strong>data
broker</strong></del></span> <span class="inserted"><ins><em>600 millions
social media profiles the company
+ to the 600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
@@ -1965,35 +1991,27 @@
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and</em></ins></span> would <span
class="inserted"><ins><em>then</em></ins></span> have <span
class="removed"><del><strong>been able</strong></del></span> to <span
class="removed"><del><strong>figure out
- who the user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>give it to</em></ins></span> the <span
class="removed"><del><strong>company has been ordered to pay a total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>US or some
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not</em></ins></span> to <span
class="inserted"><ins><em>be trusted unless it is done by free
+ <p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
- <p>In</em></ins></span> its <span
class="removed"><del><strong>customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with
microphones</strong></del></span> <span class="inserted"><ins><em>privacy
policy, Samsung explicitly confirms that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="inserted"><ins><em>third
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
<li id="M201411090">
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ snooping all the time</a>.</p>
</li>
<li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
<p>The report was as of 2014, but we don't expect this has got
@@ -2001,36 +2019,30 @@
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span class="inserted"><ins><em>TV
will not
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report
what</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
-
- <p>That</strong></del></span>
- <span class="inserted"><ins><em>user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
<li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user watches,</em></ins></span> and the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>switch to turn this off has
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing; the server</em></ins></span> could <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>save that data anyway.)</p>
+ really means nothing; the server could save that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch</em></ins></span> to <span
class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
@@ -3071,7 +3083,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/26 10:33:48 $
+$Date: 2019/03/28 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary-surveillance.it.po 26 Mar 2019 10:33:48 -0000 1.284
+++ proprietary-surveillance.it.po 28 Mar 2019 09:02:20 -0000 1.285
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1817,6 +1817,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-surveillance.ja-diff.html 26 Mar 2019 10:33:48 -0000
1.133
+++ proprietary-surveillance.ja-diff.html 28 Mar 2019 09:02:20 -0000
1.134
@@ -1026,7 +1026,7 @@
<p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many
proprietary</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1035,25 +1035,34 @@
</div>
<ul class="blurbs">
- <li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
- <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
- apps the user has
- installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way</strong></del></span>
+ <li id="M201903201">
+ <p>A study of 24 health</em></ins></span> apps <span
class="removed"><del><strong>for mobile devices report</strong></del></span>
<span class="inserted"><ins><em>found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>,</em></ins></span>
which <span class="removed"><del><strong>other
+ apps the</strong></del></span> <span class="inserted"><ins><em>can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever</em></ins></span> user <span
class="removed"><del><strong>has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>“consent”</em></ins></span> is
<span class="removed"><del><strong>doing this</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span>
+ <span class="inserted"><ins><em>lengthy terms of service</em></ins></span>
that <span class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>are difficult to understand. In any case,
+ “consent”</em></ins></span> is <span
class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what the others
do.</p></strong></del></span> <span class="inserted"><ins><em>not
sufficient to legitimize snooping.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library</em></ins></span> for <span class="removed"><del><strong>children
don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>building mobile apps, which also</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
- <span class="inserted"><ins><em>way</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
- data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
-
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
- </li>
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
@@ -1065,115 +1074,61 @@
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>perhaps by
the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em><a
+ Advertising ID</a></em></ins></span> to <span
class="inserted"><ins><em>other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> the <span
class="removed"><del><strong>app developers get
- users</strong></del></span> <span class="inserted"><ins><em>total) link
this ID</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>snooping done</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by <span
class="inserted"><ins><em>resetting it.</p>
- <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>no excuse for malware.</p>
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>phone
company, and perhaps by</strong></del></span> <span
class="inserted"><ins><em>policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
- <li><p>The Brightest Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
- that</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
- app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>developers from including malware</em></ins></span>
in <span class="removed"><del><strong>Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>their programs.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>companies, and</strong></del></span>
<span class="inserted"><ins><em><a
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
- </li>
+ recording all</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>users' actions</a></em></ins></span> in <span
class="inserted"><ins><em>interacting with</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
- Here's information</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>Google Play had one or</em></ins></span> more
<span class="removed"><del><strong>spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>app.</p>
</li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li><p>A company that makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people use it</a>.</p>
-
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used
to</em></ins></span>
+ be <span class="removed"><del><strong>distracted by the
question</strong></del></span> <span class="inserted"><ins><em>on Google Play
had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites</em></ins></span> that <span
class="removed"><del><strong>it anonymizes the data may be
- true, but it doesn't really matter. If it sells</strong></del></span>
<span class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>user interface of most of them was
designed</em></ins></span> to <span class="inserted"><ins><em>make
uninstallation
+ them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>user
interface of most of them was designed</em></ins></span> to <span
class="removed"><del><strong>say “I agree”.
That</strong></del></span> <span class="inserted"><ins><em>make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry</em></ins></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>potential risk because
- there is no easy way of knowing what they really do.</p>
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there</em></ins></span> is no <span class="removed"><del><strong>excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <li id="M201902010">
- <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out who the user
is.</p>
- </li>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <li><p>A computerized
- vibrator</strong></del></span> <span class="inserted"><ins><em>150
most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
+ source code—often used</em></ins></span> for <span
class="removed"><del><strong>use by
companies.</a></p></strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
<p>It is unfortunate that these articles talk about “free
apps.” These apps are gratis, but they are <em>not</em>
<a
@@ -1181,128 +1136,183 @@
</li>
<li id="M201901050"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span class="removed"><del><strong>because it
asked the user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="inserted"><ins><em>will do
- with the data.</p>
-
- <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>surrounded by</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> a <span
class="removed"><del><strong>person's
- body), and</strong></del></span> <span class="inserted"><ins><em>side
issue. What</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>data is</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users can
check</strong></del></span> <span class="inserted"><ins><em>secondary issue.
The principal wrong here is that
+ stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>to other companies. This
shows</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="inserted"><ins><em>what it will do
+ with</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+
+<ul>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
+ with the</em></ins></span> data <span class="removed"><del><strong>about
them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong>change.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
+ Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
<span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
<span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on <span class="removed"><del><strong>children
and adults.</a>.</p>
+ report on</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the user's actions</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same
machine</em></ins></span> via <span class="removed"><del><strong>BIOS</a>
on Windows installs.
-Note</strong></del></span>
- <span class="inserted"><ins><em>various apps. Some of them send Facebook
detailed information about
- the user's activities in the app; others only say</em></ins></span> that
the <span class="removed"><del><strong>specific sabotage method Lenovo used did
not affect
-GNU/Linux; also, a “clean” Windows</strong></del></span> <span
class="inserted"><ins><em>user is
+
+ <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,”
so</em></ins></span> that <span class="removed"><del><strong>makes
internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots</strong></del></span>
+ <span class="inserted"><ins><em>Facebook can correlate the data it obtains
from the same machine via
+ various apps. Some</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>them send Facebook detailed</em></ins></span>
information about <span class="removed"><del><strong>how
+ people use it</a>.</p>
+
+ <p>The company's statement that it
anonymizes</strong></del></span>
+ the <span class="removed"><del><strong>data may be
+ true, but it doesn't really matter. If it sells</strong></del></span>
<span class="inserted"><ins><em>user's activities in</em></ins></span> the
<span class="removed"><del><strong>data to a
+ data broker,</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
+ <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>is.</p></strong></del></span>
<span class="inserted"><ins><em>has a Facebook
+ account.</p></em></ins></span>
</li>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps on Android <a
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+ record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
+ <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other kinds of location
tracking, but most users will be tricked by the misleading
control.</p>
</li>
- <li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+ <li id="M201806110"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>Spanish football
streaming</em></ins></span> app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>temperature
of</strong></del></span> <span class="inserted"><ins><em>user's movements and
listens through</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>surrounded
by</strong></del></span> <span class="inserted"><ins><em>no way to
save</em></ins></span>
+ a <span class="removed"><del><strong>person's
+ body), and the vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span>
the <span class="removed"><del><strong>totally inadequate proposed response: a
labeling
+ standard with which manufacturers would make
statements</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn to care much less</em></ins></span> about
+ <span class="removed"><del><strong>their products, rather than free
software which users can check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit in
+ many ways. This is one more.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>adults.</a>.</p>
</li>
+</ul>
+
- <li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
+ found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>spyware via BIOS</a> on
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the proprietary
apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="inserted"><ins><em><a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p>
</li>
<li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
- other but not to the server's database.</p>
+ <p>Grindr should not have so much information
about</em></ins></span> its <span class="removed"><del><strong>own
malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>users.
+ It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
--></strong></del></span>
+ <span class="inserted"><ins><em>other but not to the server's
database.</p>
</li>
<li id="M201803050">
@@ -1738,17 +1748,21 @@
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Investigation
+ Shows</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -1800,7 +1814,7 @@
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that</em></ins></span> install <span
class="inserted"><ins><em>a surveillance app</a>.</p>
+ load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
@@ -1889,7 +1903,7 @@
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV</em></ins></span> is <span
class="inserted"><ins><em><a
+ <p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -1908,24 +1922,7 @@
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are</em></ins></span> not <span
class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>allowed</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>report
what the
+ <p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p>
</li>
@@ -2900,7 +2897,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/26 10:33:48 $
+$Date: 2019/03/28 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary-surveillance.ja.po 26 Mar 2019 10:33:48 -0000 1.257
+++ proprietary-surveillance.ja.po 28 Mar 2019 09:02:20 -0000 1.258
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1501,6 +1501,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary-surveillance.pot 26 Mar 2019 10:33:49 -0000 1.205
+++ proprietary-surveillance.pot 28 Mar 2019 09:02:20 -0000 1.206
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -997,6 +997,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" "
+"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows\">
"
+"send sensitive personal data to third parties</a>, which can use it for "
+"invasive advertising or discriminating against people in poor health "
+"condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, "
+"“consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a "
"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\"> "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.493
retrieving revision 1.494
diff -u -b -r1.493 -r1.494
--- proprietary-surveillance.ru.po 26 Mar 2019 18:00:34 -0000 1.493
+++ proprietary-surveillance.ru.po 28 Mar 2019 09:02:20 -0000 1.494
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1394,6 +1395,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.de-diff.html 28 Mar 2019 08:32:46 -0000 1.66
+++ proprietary.de-diff.html 28 Mar 2019 09:02:20 -0000 1.67
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
@@ -129,15 +129,15 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201903200">
<p>Volvo plans to <a
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths">
@@ -240,16 +252,6 @@
manufacturers collect this data</a> as part of their own spying, then
forward it to the government-run platform.</p>
</li>
-
- <li id="M201903080">
- <p>Malware installed into the processor in a hard drive could <a
-
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
- use the disk itself as a microphone to detect speech</a>.</p>
-
- <p>The article refers to the “Linux operating system” but
- seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
That
- hack would not require changing Linux itself.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.de.po 28 Mar 2019 08:32:46 -0000 1.108
+++ proprietary.de.po 28 Mar 2019 09:02:20 -0000 1.109
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -503,21 +519,6 @@
"spying, then forward it to the government-run platform."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.es.po 28 Mar 2019 08:32:46 -0000 1.127
+++ proprietary.es.po 28 Mar 2019 09:02:20 -0000 1.128
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -392,28 +408,6 @@
"spying\">los fabricantes recopilan estos datos</a> para su propio espionaje, "
"y luego los remiten a la plataforma gubernamental."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-"Software malicioso instalado en el procesador de un disco duro podrÃa <a "
-"href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
-"turned-into-listening-devices-researchers-find\">utilizar el propio disco "
-"como micrófono para detectar lenguaje hablado</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-"El artÃculo habla del «sistema operativo Linux», pero parece que quiere "
-"decir <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Al parecer, esa "
-"intrusión no requiere cambiar el propio Linux."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -493,6 +487,26 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Malware installed into the processor in a hard drive could <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
+#~ "turned-into-listening-devices-researchers-find\"> use the disk itself as "
+#~ "a microphone to detect speech</a>."
+#~ msgstr ""
+#~ "Software malicioso instalado en el procesador de un disco duro podrÃa <a "
+#~ "href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
+#~ "turned-into-listening-devices-researchers-find\">utilizar el propio disco "
+#~ "como micrófono para detectar lenguaje hablado</a>."
+
+#~ msgid ""
+#~ "The article refers to the “Linux operating system” but seems "
+#~ "to mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack "
+#~ "would not require changing Linux itself."
+#~ msgstr ""
+#~ "El artÃculo habla del «sistema operativo Linux», pero parece que quiere
"
+#~ "decir <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Al parecer, esa "
+#~ "intrusión no requiere cambiar el propio Linux."
+
+#~ msgid ""
#~ "Game Of War: Fire Age is an iPhone game with <a href=\"http://www.cracked."
#~ "com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html\"> "
#~ "addictive features</a> which are based on <a href=\"/proprietary/"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.fr.po 28 Mar 2019 08:32:46 -0000 1.155
+++ proprietary.fr.po 28 Mar 2019 09:02:20 -0000 1.156
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2019-03-26 19:10+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -295,6 +295,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -391,28 +407,6 @@
"dans le cadre de leur propre espionnage, puis les transmettent à la "
"plateforme du gouvernement."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-"Un logiciel malveillant instllé dans le processeur d'un disque dur pourrait "
-"<a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
-"turned-into-listening-devices-researchers-find\">utiliser le disque lui-même
"
-"comme microphone pour détecter la parole</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-"L'article fait référence au système d'exploitation Linux, mais semble "
-"vouloir dire <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Ce "
-"bidouillage ne nécessiterait pas de modifier Linux lui-même."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -488,6 +482,26 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Malware installed into the processor in a hard drive could <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
+#~ "turned-into-listening-devices-researchers-find\"> use the disk itself as "
+#~ "a microphone to detect speech</a>."
+#~ msgstr ""
+#~ "Un logiciel malveillant instllé dans le processeur d'un disque dur "
+#~ "pourrait <a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-"
+#~ "disks-can-be-turned-into-listening-devices-researchers-find\">utiliser le "
+#~ "disque lui-même comme microphone pour détecter la parole</a>."
+
+#~ msgid ""
+#~ "The article refers to the “Linux operating system” but seems "
+#~ "to mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack "
+#~ "would not require changing Linux itself."
+#~ msgstr ""
+#~ "L'article fait référence au système d'exploitation Linux, mais semble "
+#~ "vouloir dire <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Ce "
+#~ "bidouillage ne nécessiterait pas de modifier Linux lui-même."
+
+#~ msgid ""
#~ "Game Of War: Fire Age is an iPhone game with <a href=\"http://www.cracked."
#~ "com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html\"> "
#~ "addictive features</a> which are based on <a href=\"/proprietary/"
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.it-diff.html 28 Mar 2019 08:32:46 -0000 1.78
+++ proprietary.it-diff.html 28 Mar 2019 09:02:20 -0000 1.79
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201903200">
<p>Volvo plans to <a
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths">
@@ -239,16 +251,6 @@
manufacturers collect this data</a> as part of their own spying, then
forward it to the government-run platform.</p>
</li>
-
- <li id="M201903080">
- <p>Malware installed into the processor in a hard drive could <a
-
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
- use the disk itself as a microphone to detect speech</a>.</p>
-
- <p>The article refers to the “Linux operating system” but
- seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
That
- hack would not require changing Linux itself.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.it.po 28 Mar 2019 08:32:46 -0000 1.117
+++ proprietary.it.po 28 Mar 2019 09:02:20 -0000 1.118
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -496,21 +512,6 @@
"spying, then forward it to the government-run platform."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary.ja-diff.html 28 Mar 2019 08:32:46 -0000 1.79
+++ proprietary.ja-diff.html 28 Mar 2019 09:02:20 -0000 1.80
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -181,6 +181,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201903200">
<p>Volvo plans to <a
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths">
@@ -236,16 +248,6 @@
manufacturers collect this data</a> as part of their own spying, then
forward it to the government-run platform.</p>
</li>
-
- <li id="M201903080">
- <p>Malware installed into the processor in a hard drive could <a
-
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
- use the disk itself as a microphone to detect speech</a>.</p>
-
- <p>The article refers to the “Linux operating system” but
- seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
That
- hack would not require changing Linux itself.</p>
- </li>
</ul></em></ins></span>
@@ -306,7 +308,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.ja.po 28 Mar 2019 08:32:46 -0000 1.100
+++ proprietary.ja.po 28 Mar 2019 09:02:20 -0000 1.101
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -416,21 +432,6 @@
"spying, then forward it to the government-run platform."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.nl-diff.html 28 Mar 2019 08:32:46 -0000 1.78
+++ proprietary.nl-diff.html 28 Mar 2019 09:02:20 -0000 1.79
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
@@ -184,6 +184,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201903200">
<p>Volvo plans to <a
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths">
@@ -239,16 +251,6 @@
manufacturers collect this data</a> as part of their own spying, then
forward it to the government-run platform.</p>
</li>
-
- <li id="M201903080">
- <p>Malware installed into the processor in a hard drive could <a
-
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
- use the disk itself as a microphone to detect speech</a>.</p>
-
- <p>The article refers to the “Linux operating system” but
- seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
That
- hack would not require changing Linux itself.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.nl.po 28 Mar 2019 08:32:46 -0000 1.89
+++ proprietary.nl.po 28 Mar 2019 09:02:20 -0000 1.90
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -489,21 +505,6 @@
"spying, then forward it to the government-run platform."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.pl-diff.html 28 Mar 2019 08:32:46 -0000 1.96
+++ proprietary.pl-diff.html 28 Mar 2019 09:02:20 -0000 1.97
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
-instances of malicious functionalities (with more than 400 references to
+<p>As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -126,17 +126,17 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201903200">
<p>Volvo plans to <a
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths">
@@ -237,16 +249,6 @@
manufacturers collect this data</a> as part of their own spying, then
forward it to the government-run platform.</p>
</li>
-
- <li id="M201903080">
- <p>Malware installed into the processor in a hard drive could <a
-
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
- use the disk itself as a microphone to detect speech</a>.</p>
-
- <p>The article refers to the “Linux operating system” but
- seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
That
- hack would not require changing Linux itself.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary.pl.po 28 Mar 2019 08:32:46 -0000 1.84
+++ proprietary.pl.po 28 Mar 2019 09:02:20 -0000 1.85
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -571,21 +587,6 @@
"spying, then forward it to the government-run platform."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary.pot 28 Mar 2019 08:32:46 -0000 1.81
+++ proprietary.pot 28 Mar 2019 09:02:20 -0000 1.82
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" "
+"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows\">
"
+"send sensitive personal data to third parties</a>, which can use it for "
+"invasive advertising or discriminating against people in poor health "
+"condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, "
+"“consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a "
"href=\"https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\">
"
"install cameras inside cars</a> to monitor the driver for signs of "
@@ -310,20 +326,6 @@
"forward it to the government-run platform."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a "
-"href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find\">
"
-"use the disk itself as a microphone to detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.pt-br.po 28 Mar 2019 08:32:46 -0000 1.117
+++ proprietary.pt-br.po 28 Mar 2019 09:02:20 -0000 1.118
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2019-03-23 08:45-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -366,28 +382,6 @@
"\"> fabricantes coletam esses dados</a> como parte de sua própria espionagem
"
"e os encaminham para a plataforma administrada pelo governo."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-"Malware instalado no processador em um disco rÃgido pode <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\">usar o próprio disco como um microfone "
-"para detectar a fala</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-"O artigo faz referência ao âsistema operacional Linuxâ, mas parece "
-"significar <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Esse hack não "
-"exigiria a mudança do Linux em si."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -463,6 +457,26 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Malware installed into the processor in a hard drive could <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
+#~ "turned-into-listening-devices-researchers-find\"> use the disk itself as "
+#~ "a microphone to detect speech</a>."
+#~ msgstr ""
+#~ "Malware instalado no processador em um disco rÃgido pode <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
+#~ "turned-into-listening-devices-researchers-find\">usar o próprio disco "
+#~ "como um microfone para detectar a fala</a>."
+
+#~ msgid ""
+#~ "The article refers to the “Linux operating system” but seems "
+#~ "to mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack "
+#~ "would not require changing Linux itself."
+#~ msgstr ""
+#~ "O artigo faz referência ao âsistema operacional Linuxâ, mas parece "
+#~ "significar <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Esse hack "
+#~ "não exigiria a mudança do Linux em si."
+
+#~ msgid ""
#~ "Game Of War: Fire Age is an iPhone game with <a href=\"http://www.cracked."
#~ "com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html\"> "
#~ "addictive features</a> which are based on <a href=\"/proprietary/"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.ru.po 28 Mar 2019 08:32:46 -0000 1.194
+++ proprietary.ru.po 28 Mar 2019 09:02:20 -0000 1.195
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -299,6 +299,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -391,28 +407,6 @@
"ÑобиÑаÑÑ ÑÑи даннÑе</a> в пÑоÑеÑÑе
ÑобÑÑвенного Ñпионажа, а заÑем пеÑедаÑÑ "
"иÑ
на плаÑÑоÑмÑ, пÑедоÑÑавленнÑÑ
гоÑÑдаÑÑÑвом."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-"ÐÑедоноÑнÑе пÑогÑаммÑ, ÑÑÑановленнÑе в
пÑоÑеÑÑоÑе жеÑÑкого диÑка, могли Ð±Ñ "
-"<a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
-"turned-into-listening-devices-researchers-find\"> иÑполÑзоваÑÑ
Ñам диÑк как "
-"микÑоÑон, ÑÑÐ¾Ð±Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑ ÑеÑÑ</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-"ÐÑа ÑÑаÑÑÑ ÑÑÑлаеÑÑÑ Ð½Ð° “опеÑаÑионнÑÑ
ÑиÑÑÐµÐ¼Ñ Linux”, но имееÑÑÑ "
-"в Ð²Ð¸Ð´Ñ <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. ÐÑоÑ
ÑÑÑк не "
-"поÑÑебовал Ð±Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹ в Ñамом Linux."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -492,6 +486,26 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Malware installed into the processor in a hard drive could <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-"
+#~ "turned-into-listening-devices-researchers-find\"> use the disk itself as "
+#~ "a microphone to detect speech</a>."
+#~ msgstr ""
+#~ "ÐÑедоноÑнÑе пÑогÑаммÑ, ÑÑÑановленнÑе в
пÑоÑеÑÑоÑе жеÑÑкого диÑка, могли "
+#~ "Ð±Ñ <a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-"
+#~ "can-be-turned-into-listening-devices-researchers-find\">
иÑполÑзоваÑÑ Ñам "
+#~ "диÑк как микÑоÑон, ÑÑÐ¾Ð±Ñ Ð¾Ð±Ð½Ð°ÑÑживаÑÑ
ÑеÑÑ</a>."
+
+#~ msgid ""
+#~ "The article refers to the “Linux operating system” but seems "
+#~ "to mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack "
+#~ "would not require changing Linux itself."
+#~ msgstr ""
+#~ "ÐÑа ÑÑаÑÑÑ ÑÑÑлаеÑÑÑ Ð½Ð°
“опеÑаÑионнÑÑ ÑиÑÑÐµÐ¼Ñ Linux”, но "
+#~ "имееÑÑÑ Ð² Ð²Ð¸Ð´Ñ <a
href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. ÐÑÐ¾Ñ "
+#~ "ÑÑÑк не поÑÑебовал Ð±Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ð¹ в Ñамом
Linux."
+
+#~ msgid ""
#~ "Game Of War: Fire Age is an iPhone game with <a href=\"http://www.cracked."
#~ "com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html\"> "
#~ "addictive features</a> which are based on <a href=\"/proprietary/"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.zh-tw-diff.html 28 Mar 2019 08:32:46 -0000 1.56
+++ proprietary.zh-tw-diff.html 28 Mar 2019 09:02:20 -0000 1.57
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
@@ -129,15 +129,15 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -185,6 +185,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903201">
+ <p>A study of 24 health apps found that 19 of them <a href="
+
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
+ health condition.</p>
+
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
<li id="M201903200">
<p>Volvo plans to <a
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths">
@@ -240,16 +252,6 @@
manufacturers collect this data</a> as part of their own spying, then
forward it to the government-run platform.</p>
</li>
-
- <li id="M201903080">
- <p>Malware installed into the processor in a hard drive could <a
-
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find">
- use the disk itself as a microphone to detect speech</a>.</p>
-
- <p>The article refers to the “Linux operating system” but
- seems to mean <a href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
That
- hack would not require changing Linux itself.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.zh-tw.po 28 Mar 2019 08:32:46 -0000 1.67
+++ proprietary.zh-tw.po 28 Mar 2019 09:02:20 -0000 1.68
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
"volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
"cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -405,21 +421,6 @@
"spying, then forward it to the government-run platform."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://"
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the “Linux operating system” but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- pt-br.po 28 Mar 2019 08:32:46 -0000 1.71
+++ pt-br.po 28 Mar 2019 09:02:20 -0000 1.72
@@ -4364,6 +4364,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- ru.po 28 Mar 2019 08:32:46 -0000 1.123
+++ ru.po 28 Mar 2019 09:02:20 -0000 1.124
@@ -5970,6 +5970,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- zh-tw.po 28 Mar 2019 08:32:46 -0000 1.54
+++ zh-tw.po 28 Mar 2019 09:02:20 -0000 1.55
@@ -4137,6 +4137,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://"
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user “consent” is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, “"
+"consent” is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., (continued)
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/26
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/28
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/30