[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy government-free-software.fr.html...
From: |
GNUN |
Subject: |
www/philosophy government-free-software.fr.html... |
Date: |
Fri, 14 Nov 2014 11:27:09 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 14/11/14 11:27:08
Modified files:
philosophy : government-free-software.fr.html
words-to-avoid.fr.html
philosophy/po : government-free-software.fr-en.html
words-to-avoid.fr-en.html
philosophy/proprietary: proprietary-sabotage.fr.html
proprietary-surveillance.fr.html
philosophy/proprietary/po: proprietary-sabotage.fr-en.html
proprietary-surveillance.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/government-free-software.fr.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.fr.html?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/government-free-software.fr-en.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.fr-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.11&r2=1.12
Patches:
Index: government-free-software.fr.html
===================================================================
RCS file: /web/www/www/philosophy/government-free-software.fr.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- government-free-software.fr.html 9 Nov 2014 12:29:03 -0000 1.44
+++ government-free-software.fr.html 14 Nov 2014 11:27:06 -0000 1.45
@@ -221,10 +221,23 @@
</p></li>
</ul>
+<h3>Neutralité technologique</h3>
+
<p>Un tel train de mesures doit permettre à l'Ãtat de recouvrer le contrôle
et
la souveraineté de son informatique, ainsi que d'amener les citoyens, les
entreprises et les organisations du pays à prendre le contrôle de leur
-informatique.</p>
+informatique. Toutefois, certains objectent que ceci violerait le
+« principe » de neutralité.</p>
+
+<p>La notion de neutralité technique est que l'Ãtat ne doit pas imposer de
+préférence arbitraire sur des choix techniques. On peut discuter la validité
+de ce principe, mais en tout état de cause il ne concerne que des questions
+purement techniques. Les mesures préconisées ici ont des enjeux d'importance
+éthique, sociétale et politique, et par conséquent <a
+href="/philosophy/technological-neutrality.html">n'entrent pas dans le cadre
+de la neutralité <em>technologique</em></a>. Seuls ceux qui désirent mettre
+un pays sous leur joug pourraient suggérer que son gouvernement soit
+« neutre » en ce qui concerne sa souveraineté et la liberté de ses
citoyens.</p>
<div class="translators-notes">
@@ -287,7 +300,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2014/11/09 12:29:03 $
+$Date: 2014/11/14 11:27:06 $
<!-- timestamp end -->
</p>
Index: words-to-avoid.fr.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.fr.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- words-to-avoid.fr.html 14 Aug 2014 21:27:39 -0000 1.141
+++ words-to-avoid.fr.html 14 Nov 2014 11:27:07 -0000 1.142
@@ -274,21 +274,24 @@
contenu) et l'appliquer à des Åuvres de l'esprit, écrites ou autres,
reflète
une attitude que vous feriez mieux d'éviter. Cela revient à considérer ces
Åuvres comme des marchandises dont le but est de remplir des boîtes et de
-faire de l'argent. De fait, ce terme ne respecte pas les Åuvres
elles-mêmes.</p>
+faire de l'argent. De fait, ce terme les rabaisse. Si vous n'êtes pas
+d'accord avec cette attitude, vous pouvez les appeler « Åuvres » ou
+« publications ».
+</p>
<p>
-Ceux qui utilisent ce terme sont souvent les éditeurs qui s'efforcent
-d'obtenir des pouvoirs de copyright accrus au nom des auteurs
-(« créateurs », comme ils disent) des Åuvres. Le terme « contenu »
révèle ce
-qu'ils pensent vraiment de ces Åuvres et des ces auteurs (consultez <a
+Ceux qui utilisent le terme « contenu » sont souvent les éditeurs qui
+s'efforcent d'obtenir des pouvoirs de copyright accrus au nom des auteurs
+(« créateurs », comme ils disent) des Åuvres. « Contenu » révèle
ce qu'ils
+pensent vraiment de ces Åuvres et de leurs auteurs (consultez <a
href="http://archive.salon.com/tech/feature/2000/06/14/love/print.html">Courtney
Love's open letter to Steve Case</a> [en] â Lettre ouverte de Courtney Love
-à Steve Case â et recherchez <cite>content provider</cite> dans cette
-page ; hélas, Madame Love n'est pas consciente que le terme « propriété
+à Steve Case â et recherchez <cite>content provider</cite> dans cette
page ;
+hélas, Madame Love n'est pas consciente que le terme « propriété
intellectuelle » est aussi <a href="#IntellectualProperty">trompeur</a>).</p>
<p>
-Quoi qu'il en soit, aussi longtemps que d'autres personnes utiliseront le
-terme « fournisseurs de contenu » <cite>[content providers]</cite>, les
-dissidents politiques peuvent tout aussi bien se donner le nom de
+Quoi qu'il en soit, aussi longtemps que d'autres personnes utiliseront
+l'expression « fournisseurs de contenu » <cite>[content providers]</cite>,
+les dissidents politiques peuvent tout aussi bien se donner le nom de
« fournisseurs de mécontentement » <cite>[malcontent
providers]</cite>.</p>
<p>
Le terme de « gestion de contenu » remporte le prix de la
@@ -965,7 +968,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2014/08/14 21:27:39 $
+$Date: 2014/11/14 11:27:07 $
<!-- timestamp end -->
</p>
Index: po/government-free-software.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/government-free-software.fr-en.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- po/government-free-software.fr-en.html 9 Nov 2014 12:29:03 -0000
1.37
+++ po/government-free-software.fr-en.html 14 Nov 2014 11:27:07 -0000
1.38
@@ -204,9 +204,23 @@
</p></li>
</ul>
-<p>With these measures, the state can recover control over its computing,
-and lead the country's citizens, businesses and organizations towards
-control over their computing.</p>
+<h3>Technological neutrality</h3>
+
+<p>With the measures in this article, the state can recover control
+over its computing, and lead the country's citizens, businesses and
+organizations towards control over their computing. However, some
+object on the grounds that this would violate the
+“principle” of technological neutrality.</p>
+
+<p>The idea of technological neutrality is that the state should not
+impose arbitrary preferences on technical choices. Whether that is a
+valid principle is disputable, but it is limited in any case to issues
+that are merely technical. The measures advocated here address issues
+of ethical, social and political importance, so they are
+<a href="/philosophy/technological-neutrality.html">outside the scope
+of <em>technological</em> neutrality</a>. Only those who wish to
+subjugate a country would suggest that its goverment be
+“neutral” about its sovereignty or its citizens' freedom.</p>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -248,7 +262,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/11/09 12:29:03 $
+$Date: 2014/11/14 11:27:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/words-to-avoid.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.fr-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/words-to-avoid.fr-en.html 5 Aug 2014 13:27:02 -0000 1.70
+++ po/words-to-avoid.fr-en.html 14 Nov 2014 11:27:07 -0000 1.71
@@ -331,17 +331,20 @@
noun to describe written and other works of authorship adopts an
attitude you might rather avoid. It regards these works as a
commodity whose purpose is to fill a box and make money. In effect,
-it disparages the works themselves.</p>
+it disparages the works themselves. If you don't agree with that
+attitude, you can call them “works” or “publications.”
+</p>
<p>
-Those who use this term are often the publishers that push for
-increased copyright power in the name of the authors
+Those who use the term “content” are often the publishers
+that push for increased copyright power in the name of the authors
(“creators,” as they say) of the works. The term
-“content” reveals their real attitude towards these works and
their authors.
+“content” reveals their real attitude towards these works
+and their authors.
(See <a
href="http://archive.salon.com/tech/feature/2000/06/14/love/print.html">Courtney
Love's open letter to Steve Case</a> and search for “content
provider” in that page. Alas, Ms. Love is unaware that the term
-“intellectual property” is also <a href="#IntellectualProperty">
-biased and confusing</a>.)</p>
+“intellectual property” is
+also <a href="#IntellectualProperty"> biased and confusing</a>.)</p>
<p>
However, as long as other people use the term “content
provider,” political dissidents can well call themselves
@@ -976,7 +979,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/08/05 13:27:02 $
+$Date: 2014/11/14 11:27:07 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/proprietary-sabotage.fr.html 24 Oct 2014 17:27:07 -0000
1.2
+++ proprietary/proprietary-sabotage.fr.html 14 Nov 2014 11:27:07 -0000
1.3
@@ -86,6 +86,18 @@
</li>
<li>
+<p>Les applications d'Adobe contiennent des bombes à retardement : elles <a
+href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/">
+cessent de fonctionner au bout d'un certain temps</a>, après quoi
+l'utilisateur doit payer pour prolonger cette durée.</p>
+
+<p>Il y a eu une fois un problème sur les serveurs qu'utilisent ces programmes
+pour vérifier qui a payé et <a
+href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out">
+les applications ont cessé de fonctionner pour tout le monde</a>.</p>
+</li>
+
+<li>
<p>Sony <a
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3">a
saboté la Playstation 3</a> avec une rétrogradation du micrologiciel
@@ -208,7 +220,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2014/10/24 17:27:07 $
+$Date: 2014/11/14 11:27:07 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/proprietary-surveillance.fr.html 6 Nov 2014 09:28:11
-0000 1.13
+++ proprietary/proprietary-surveillance.fr.html 14 Nov 2014 11:27:08
-0000 1.14
@@ -11,7 +11,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Surveillance par le logiciel privateur</h2>
-<p><a href="/philosophy/proprietary/proprietary.html">Autres exemples de
+<p><a href="/philosophy/proprietary/proprietary.html"> Autres exemples de
malveillance dans le logiciel privateur</a></p>
<div class="toc">
@@ -79,42 +79,13 @@
logiciels privateurs espionnant l'utilisateur ou le suivant à la
trace</strong>.</p>
-<!-- Latest entries: you can add new articles there, and the
-webmasters will categorize them. Make sure to open a ticket! -->
-<h3 id="LatestAdditions">Ajouts récents</h3>
-<ul>
- <li><p>Apple a fait en sorte que différents <a
-href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">programmes
-de MacOS lui envoient des fichiers sans en demander la permission</a>. Ceci
-expose ces fichiers à Big Brother et peut-être à d'autres fouineurs.</p>
- </li>
- <li><p>Diverses opérations effectuées dans <a
-href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">le
-dernier MacOS</a> envoient des rapports aux serveurs d'Apple.</p>
- </li>
- <li><p>Apple reconnaît que <a
-href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">l'un
-de ses moteurs de recherche espionne</a>, mais il existe <a
-href="https://github.com/fix-macosx/yosemite-phone-home">d'autres
-dispositifs fouineurs dont Apple n'a jamais parlé</a>.</p>
- </li>
+<h3 id="LatestAdditions">Ajouts récents</h3>
- <li><p><a
-href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
-Le moteur de recherche de fichiers <cite>Spotlight</cite></a> envoie à Apple
-les termes recherchés par l'utilisateur.</p>
- </li>
-
- <li><p>Cela ne fait qu'empirer avec le temps. <a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
-Windows 10 exige des utilisateurs qu'ils acceptent la totale en fait de
-fouinage</a>, ce qui inclut leurs fichiers, leurs commandes, ainsi que leurs
-entrées texte et audio.</p>
- </li>
-</ul>
+<p>Les ajouts récents se trouvent au début de chaque catégorie</p>
<!-- #OSSpyware -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="OSSpyware">Espions dans les systèmes d'exploitation</h3>
<span class="anchor-reference-id">(<a
@@ -130,6 +101,13 @@
</div>
<ul>
+ <li><p>Cela ne fait qu'empirer avec le temps. <a
+href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+Windows 10 exige des utilisateurs qu'ils acceptent la totale en fait de
+fouinage</a>, ce qui inclut leurs fichiers, leurs commandes, ainsi que leurs
+entrées texte et audio.</p>
+ </li>
+
<li><p><a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update espionne l'utilisateur</a>.</p>
@@ -144,17 +122,10 @@
href="http://www.marketoracle.co.uk/Article40836.html"> une clé secrète de
la NSA</a> dont nous ne connaissons pas la fonction. </p>
</li>
-
- <li><p>Cela ne fait qu'empirer avec le temps. <a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
-Windows 10 exige des utilisateurs qu'ils acceptent la totale en fait de
-fouinage</a>, ce qui inclut leurs fichiers, leurs commandes, ainsi que leurs
-entrées texte et audio.</p>
- </li>
</ul>
<p>Il y a bien d'autres <a
-href="/philosophy/proprietary/malware-microsoft.html">logiciels Microsoft
+href="/philosophy/proprietary/malware-microsoft.html"> logiciels Microsoft
malveillants</a>.</p>
@@ -166,9 +137,10 @@
<ul>
<li><p>Apple a fait en sorte que différents <a
-href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">programmes
-de MacOS lui envoient des fichiers sans en demander la permission</a>. Ceci
-expose ces fichiers à Big Brother et peut-être à d'autres fouineurs.</p>
+href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+programmes de MacOS lui envoient des fichiers sans en demander la
+permission</a>. Ceci expose ces fichiers à Big Brother et peut-être Ã
+d'autres fouineurs.</p>
<p>Cela montre aussi pourquoi on ne peut pas faire confiance au logiciel
privateur : même si la version d'aujourd'hui n'a pas de fonctionnalité
@@ -177,14 +149,15 @@
utilisateurs ne la rejettent fermement et ils ne peuvent pas l'enlever
eux-mêmes.</p>
</li>
+
<li><p>Diverses opérations effectuées dans <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">le
dernier MacOS</a> envoient des rapports aux serveurs d'Apple.</p>
</li>
<li><p>Apple reconnaît que <a
-href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">l'un
-de ses moteurs de recherche espionne</a>, mais il existe <a
+href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+l'un de ses moteurs de recherche espionne</a>, mais il existe <a
href="https://github.com/fix-macosx/yosemite-phone-home">d'autres
dispositifs fouineurs dont Apple n'a jamais parlé</a>.</p>
</li>
@@ -228,6 +201,7 @@
</ul>
<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnMobiles">Espions dans les mobiles</h3>
<span class="anchor-reference-id">(<a
@@ -372,6 +346,7 @@
</ul>
<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Espions sur le lieu de travail</h3>
<span class="anchor-reference-id">(<a
@@ -404,6 +379,7 @@
</ul>
<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheRoad">Espions sur la route</h3>
<span class="anchor-reference-id">(<a
@@ -428,8 +404,8 @@
<li><p>Adobe a fait en sorte que « Digital Editions » (la liseuse
utilisée par la
plupart des bibliothèques aux Ãtats-Unis) <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
-lui envoie énormément de données</a>. Leur excuse : on en a besoin pour
-vérifier les DRM !</p>
+lui envoie une quantité énorme de données</a>. Leur excuse : on en a besoin
+pour vérifier les DRM !</p>
</li>
</ul>
@@ -452,6 +428,7 @@
</ul>
<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtHome">Espions à la maison</h3>
<span class="anchor-reference-id">(<a
@@ -496,6 +473,7 @@
</ul>
<!-- #SpywareOnTheWeb -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Espions sur le web</h3>
<span class="anchor-reference-id">(<a
@@ -651,7 +629,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2014/11/06 09:28:11 $
+$Date: 2014/11/14 11:27:08 $
<!-- timestamp end -->
</p>
Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file:
/web/www/www/philosophy/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/proprietary-sabotage.fr-en.html 24 Oct 2014 17:27:07
-0000 1.3
+++ proprietary/po/proprietary-sabotage.fr-en.html 14 Nov 2014 11:27:08
-0000 1.4
@@ -24,7 +24,7 @@
user agrees to a new EULA.</a>
</p>
<p>We can be quite sure this EULA is is unjust because injustice is
-the only motive for imposing a EULA.
+the only motive for imposing an EULA.
</p>
</li>
@@ -73,6 +73,17 @@
</li>
<li>
+<p>Adobe applications have time bombs:
+they <a
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/">stop
+working after a certain time</a>, after which the user must pay to
+extend the time.</p>
+
+<p>Once there was a problem with the servers that these programs use
+to check who has paid, and
+<a
href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out">the
applications refused to work for anyone</a>.</p>
+</li>
+
+<li>
<p>Sony <a
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3">sabotaged
the Playstation 3</a> with a firmware downgrade that removed the
feature that allowed users to run GNU/Linux on it.</p>
@@ -171,7 +182,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/10/24 17:27:07 $
+$Date: 2014/11/14 11:27:08 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file:
/web/www/www/philosophy/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/proprietary-surveillance.fr-en.html 6 Nov 2014 09:28:12
-0000 1.11
+++ proprietary/po/proprietary-surveillance.fr-en.html 14 Nov 2014 11:27:08
-0000 1.12
@@ -6,7 +6,8 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Surveillance</h2>
-<p><a href="/philosophy/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
+<p><a href="/philosophy/proprietary/proprietary.html">
+ Other examples of proprietary malware</a></p>
<div class="toc">
<h3 id="TableOfContents">Table of Contents</h3>
@@ -76,44 +77,13 @@
track <strong>clearly established cases of proprietary software that
spies on or track users</strong>.</p>
-<!-- Latest entries: you can add new articles there, and the
-webmasters will categorize them. Make sure to open a ticket! -->
<h3 id="LatestAdditions">Latest additions</h3>
-<ul>
- <li><p>Apple has made
- various <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">MacOS
- programs send files to Apple servers without asking
- permission</a>. This exposes the files to Big Brother and perhaps to
- other snoops.</p>
- </li>
- <li><p>Various operations in
- <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
- the latest MacOS send reports to Apple</a> servers.</p>
- </li>
-
- <li><p>Apple admits the
- <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in a search facility</a>,
- but there's a lot
- <a href="https://github.com/fix-macosx/yosemite-phone-home">more
snooping that Apple has not talked about</a>.</p>
- </li>
-
- <li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a>
- sends users' search terms to Apple.</p>
- </li>
-
- <li><p>It only gets worse with time.
- <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
- Windows 10 requires users to give permission for total snooping</a>,
- including their files, their commands, their text input, and their voice
input.</p>
- </li>
-</ul>
-
+<p>Latest additions are found on top under each category.</p>
<!-- #OSSpyware -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="OSSpyware">Spyware in Operating Systems</h3>
@@ -128,6 +98,13 @@
</div>
<ul>
+ <li><p>It only gets worse with time.
+ <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+ Windows 10 requires users to give permission for total snooping</a>,
+ including their files, their commands, their text input, and their
+ voice input.</p>
+ </li>
+
<li><p><a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user.</a></p>
</li>
@@ -141,15 +118,10 @@
secret NSA key in Windows</a>,
whose functions we don't know.</p>
</li>
-
- <li><p>It only gets worse with time.
- <a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
- Windows 10 requires users to give permission for total snooping</a>,
- including their files, their commands, their text input, and their voice
input.</p>
- </li>
</ul>
-<p>There's a lot more <a
href="/philosophy/proprietary/malware-microsoft.html">Microsoft malware</a>.</p>
+<p>There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+ Microsoft malware</a>.</p>
<div class="big-subsection">
@@ -158,9 +130,9 @@
</div>
<ul>
- <li><p>Apple has made
- various <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">MacOS
- programs send files to Apple servers without asking
+ <li><p>Apple has made various
+ <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files to Apple servers without asking
permission</a>. This exposes the files to Big Brother and perhaps to
other snoops.</p>
@@ -170,6 +142,7 @@
remove the malfeature unless many users push back hard, and the users
can't remove it themselves.</p>
</li>
+
<li><p>Various operations in
<a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
the latest MacOS send reports to Apple</a> servers.</p>
@@ -177,19 +150,18 @@
<li><p>Apple admits the
<a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in a search facility</a>,
- but there's a lot
- <a href="https://github.com/fix-macosx/yosemite-phone-home">more
snooping that Apple has not talked about</a>.</p>
+ spying in a search facility</a>, but there's a lot
+ <a href="https://github.com/fix-macosx/yosemite-phone-home">
+ more snooping that Apple has not talked about</a>.</p>
</li>
<li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a>
- sends users' search terms to Apple.</p>
+ Spotlight search</a> sends users' search terms to Apple.</p>
</li>
</ul>
-<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>,
-and <a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
+<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
+<a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
<div class="big-subsection">
@@ -198,8 +170,8 @@
</div>
<ul>
- <li><p>Spyware is present in some Android devices when they are
- sold. Some Motorola phones modify Android to
+ <li><p>Spyware is present in some Android devices when they are sold.
+ Some Motorola phones modify Android to
<a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
send personal data to Motorola</a>.</p>
</li>
@@ -210,14 +182,14 @@
</li>
<li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a>
- provides access to any file on the system.</p>
+ Samsung's back door</a> provides access to any file on the system.</p>
</li>
</ul>
<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
@@ -239,20 +211,20 @@
<!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
</li>
- <li><p>There is also a feature for web sites to track users, which
- is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <li><p>There is also a feature for web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it
is still true in iOS 7.)</p>
</li>
- <li><p>The iThing
- also <a
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <li><p>The iThing also
+ <a
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
- <li><p>Apple can, and regularly
- does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
</li>
@@ -263,8 +235,8 @@
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here is
- the <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
+ possible purpose other than surveillance</a>. Here is the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">
Technical presentation</a>.</p>
</li>
</ul>
@@ -349,6 +321,7 @@
<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -382,6 +355,7 @@
<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
@@ -402,9 +376,9 @@
</li>
<li><p>Adobe made “Digital Editions,” the e-reader used
- by most US
- libraries, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">send
- lots of data to Adobe</a>. Adobe's “excuse”: it's
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
</ul>
@@ -417,19 +391,17 @@
<ul>
<li><p>Tesla cars allow the company to extract data remotely and
- determine the car's location at any time.
- (See <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>).
- The company says it doesn't store this information, but if the
- state orders it to get the data and hand it over, the state can
- store it.</p>
+ determine the car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but if the state orders it to get the data
+ and hand it over, the state can store it.</p>
</li>
</ul>
-
-
<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtHome">Spyware at Home</h3>
@@ -452,11 +424,10 @@
<ul>
<li><p>Spyware in
<a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a>
- reports what the user watches, and the switch to turn this off
- has no effect. (The fact that the transmission reports a 404
- error really means nothing; the server could save that data
- anyway.)</p>
+ LG “smart” TVs</a> reports what the user watches, and
+ the switch to turn this off has no effect. (The fact that the
+ transmission reports a 404 error really means nothing; the server
+ could save that data anyway.)</p>
<p>Even worse, it
<a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
@@ -466,14 +437,14 @@
happen in any product.</p>
<p>However, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
</ul>
<!-- #SpywareOnTheWeb -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -481,10 +452,11 @@
</div>
<div style="clear: left;"></div>
-<p>In addition, many web sites spy on their visitors. Web sites are not
programs, so it
-<a href="/philosophy/network-services-arent-free-or-nonfree.html">
-makes no sense to call them “free” or
“proprietary”</a>,
-but the surveillance is an abuse all the same.</p>
+<p>In addition, many web sites spy on their visitors. Web sites are not
+ programs, so it
+ <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+ makes no sense to call them “free” or
“proprietary”</a>,
+ but the surveillance is an abuse all the same.</p>
<ul>
<li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
@@ -507,8 +479,7 @@
<li><p>Many web sites report all their visitors to Google by using
the Google Analytics service, which
<a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was
- visited.</a></p>
+ tells Google the IP address and the page that was visited.</a></p>
</li>
<li><p>Many web sites try to collect users' address books (the
@@ -535,8 +506,7 @@
<li><p>Flash is also used for
<a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a>
- to identify users.</p>
+ “fingerprinting” devices </a> to identify users.</p>
</li>
</ul>
@@ -600,7 +570,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2014/11/06 09:28:12 $
+$Date: 2014/11/14 11:27:08 $
<!-- timestamp end -->
</p>
</div>