[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/proprietary-back-doors.it.html ...
From: |
GNUN |
Subject: |
www proprietary/proprietary-back-doors.it.html ... |
Date: |
Sun, 13 Dec 2015 07:42:50 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/12/13 07:42:49
Modified files:
proprietary : proprietary-back-doors.it.html
proprietary-sabotage.it.html
proprietary-surveillance.it.html
proprietary/po : proprietary-back-doors.it-en.html
proprietary-sabotage.it-en.html
proprietary-sabotage.it.po
proprietary-surveillance.it-en.html
proprietary-surveillance.it.po
server : sitemap.it.html
server/po : sitemap.it-en.html sitemap.it.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.it.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.it.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it.po?cvsroot=www&r1=1.60&r2=1.61
Patches:
Index: proprietary/proprietary-back-doors.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-back-doors.it.html 7 Dec 2015 00:28:35 -0000
1.6
+++ proprietary/proprietary-back-doors.it.html 13 Dec 2015 07:42:46 -0000
1.7
@@ -17,6 +17,20 @@
software proprietario.</p>
<ul>
+ <li>
+ <p>Microsoft sta <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">attaccando
+i computer con Windows 7 e 8</a>, attivando un interruttore che dice se
+“aggiornare” a Windows 10 anche quando gli utenti lo hanno
+disattivato.</p>
+
+ <p>Questa, tra l'altro, è un'ulteriore conferma della presenza di una
backdoor
+in Windows 7 e 8.</p>
+ </li>
+<li><p>Il modem via cavo ARRIS ha una <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+backdoor nella backdoor</a>.</p>
+</li>
<li><p>I veicoli caterpillar hanno una <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">back-door
che spegne il motore</a> da remoto.</p>
@@ -233,7 +247,7 @@
<ul>
<li>
<p>A detta di rispettati esperti di sicurezza informatica, <a
-href="http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">il
+href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">il
microcodice scrivibile per processori Intel ed AMD</a> può essere un veicolo
attraverso cui l'NSA può invadere i computer, con l'aiuto di Microsoft.
</p>
@@ -304,7 +318,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/12/07 00:28:35 $
+$Date: 2015/12/13 07:42:46 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.it.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/proprietary-sabotage.it.html 24 Oct 2015 21:59:02 -0000
1.7
+++ proprietary/proprietary-sabotage.it.html 13 Dec 2015 07:42:46 -0000
1.8
@@ -17,6 +17,22 @@
di una backdoor.</p>
<ul>
+ <li>
+ <p>Che vi piaccia o no, Microsoft sta <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">costringendo
+gli utenti ad aggiornare a Windows 10</a>, ignorando la preferenza in
+Windows 7 e 8 che si poteva usare per non aggiornare. Questa è un'ulteriore
+conferma della <a href="/proprietary/proprietary-back-doors.html">presenza
+di una backdoor in Windows</a> 7 e 8.</p>
+ </li>
+ <li><p>Gli "aggiornamenti" di Windows 10 <a
+href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
+cancellano applicazioni</a> senza chiedere il permesso.</p>
+ </li>
+ <li><p>Google da tempo ha una <a
+href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">back
+door per sbloccare da remoto un dispositivo Android</a>, a meno che il suo
+disco non sia criptato (opzione possibile da Android 5.0 Lollipop).</p></li>
<li><p>
Alcuni utenti segnalano che <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
@@ -263,7 +279,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/10/24 21:59:02 $
+$Date: 2015/12/13 07:42:46 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/proprietary-surveillance.it.html 19 Nov 2015 22:28:23
-0000 1.12
+++ proprietary/proprietary-surveillance.it.html 13 Dec 2015 07:42:47
-0000 1.13
@@ -48,6 +48,7 @@
</li>
<li><a href="#SpywareOnTheRoad">Spyware sulla strada</a>
<ul>
+ <li><a href="#SpywareInCameras">Spyware in fotocamere</a></li>
<li><a href="#SpywareInElectronicReaders">Spyware nei lettori
e-book</a></li>
<li><a href="#SpywareInVehicles">Spyware nei veicoli</a></li>
</ul>
@@ -59,6 +60,7 @@
</li>
<li><a href="#SpywareOnTheWeb">Spyware sul web</a>
<ul>
+ <li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
<li><a href="#SpywareInFlash">Spyware in Flash</a></li>
</ul>
</li>
@@ -108,6 +110,15 @@
</div>
<ul>
+ <li><p>Un "peggioramento" (mascherato da aggiornamento) di Windows 10 ha
cancellato
+applicazioni che rilevavano la sorveglianza. Un ulteriore "aggiornamento" ha
+inserito un programma di spionaggio. Gli utenti lo hanno notato e si sono
+lamentati, quindi Microsoft ne ha <a
+href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">cambiato
+il nome</a> affinché gli utenti credessero che era stato eliminato.</p>
+
+ <p>Chi usa software proprietario si espone ad essere trattato in questo
modo.</p>
+ </li>
<li><p>
Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
@@ -228,6 +239,22 @@
</div>
<ul>
+ <li><p>Sono state trovate attività di “comunicazione non
chiara”, non
+collegata all'attività dell'applicazione, <a
+href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+nelle 500 applicazioni gratuite per Android più diffuse</a>.</p>
+
+ <p>L'articolo è in inglese e usa “free” nel senso di
+“gratuito”; dato che “free” significa anche
+“libero”, in inglese preferiamo che si usi “gratis”
+in questi casi.</p>
+
+ <p>L'articolo dà per scontato che gli strumenti di analisi comuni siano
+legittimi, ma questo è vero? Gli sviluppatori di software non hanno il
+diritto di analizzare quello che gli utenti fanno o come lo fanno. Gli
+strumenti di "statistica" che spiano sono sbagliati come qualsiasi altro
+sistema di spionaggio.</p>
+ </li>
<li><p>Le applicazioni gratuite per Android (gratuite, ma non <a
href="/philosophy/free-sw.html">libere</a>) si collegano in media a 100
indirizzi di <a
@@ -396,6 +423,19 @@
</div>
<ul>
+ <li><p>La nuova applicazione di Facebook, Magic Photo, <a
+href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">cerca
+volti ad essa noti nelle raccolte di foto del vostro telefono</a>, e vi
+suggerisce di condividere la foto secondo la persona che trova
+nell'inquadratura.</p>
+
+ <p>Questa funzione spia ha probabilmente accesso a qualche database
centrale, e
+quindi probabilmente le foto vengono inviate tramite la rete ai server di
+Facebook e ai suoi algoritmi di riconoscimento.</p>
+
+ <p>Ma allora nessuna delle foto degli utenti di Facebook è privata,
nemmeno se
+l'utente ha evitato di "caricarla" sul servizio.</p>
+ </li>
<li><p>Come molti servizi di streaming (che noi preferiamo chiamare
"disservizi di
screaming", urlare) Spotify è basato su malware proprietario (DRM e
@@ -556,6 +596,22 @@
</div>
<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in fotocamere</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>La macchina fotografica "intelligente" Nest Cam è <a
+href="http://www.bbc.com/news/technology-34922712">sempre attiva</a>, anche
+quando il suo “proprietario” pensa di averla spenta.</p>
+ <p>Quando un dispositivo è "smart" o "intelligente" in realtà è il suo
+produttore che sta cercando di essere più "smart" o "intelligente" degli
+utenti.</p>
+ </li>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInElectronicReaders">Spyware nei lettori e-book</h4>
@@ -577,7 +633,6 @@
</li>
</ul>
-
<div class="big-subsection">
<h4 id="SpywareInVehicles">Spyware nei veicoli</h4>
<span class="anchor-reference-id">(<a
@@ -616,15 +671,6 @@
<div style="clear: left;"></div>
<ul>
- <li><p>Alcune pubblicità trasmesse via web e TV contengono suoni che non
sono
-udibili dall'orecchio umano ma sono catturati da malware proprietario che è
-in esecuzione su altri dispositivi che si trovano nelle vicinanze. Una volta
-che i vostri dispositivi Internet sono stati associati alla vostra TV con
-questa tecnica, le aziende possono studiare correlazioni tra le pubblicità e
-l'attività web e svolgere altre attività di <a
-href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">tracciamento
-su dispositivi multipli</a>.</p>
- </li>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">Dei
computer dati in "affitto con riscatto" sono stati programmati per
@@ -646,6 +692,22 @@
“smart” TV di Amazon.</p>
<ul>
+ <li><p>L'alleanza di Tivo con Viacom aggiunge 2.3 milioni di famiglie ai 600
+milioni di profili social che l'azienda già controlla. I clienti di Tivo non
+sanno che gli inserzionisti li stanno guardando. Combinando le informazioni
+sulla fruizione televisiva con la partecipazione nei social, Tivo ora può <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlare
+la pubblicità in TV con gli acquisti</a>, esponendo tutti gli utenti a una
+nuova forma di sorveglianza combinata.</p></li>
+ <li><p>Alcune pubblicità trasmesse via web e TV contengono suoni che non
sono
+udibili dall'orecchio umano ma sono catturati da malware proprietario che è
+in esecuzione su altri dispositivi che si trovano nelle vicinanze. Una volta
+che i vostri dispositivi Internet sono stati associati alla vostra TV con
+questa tecnica, le aziende possono studiare correlazioni tra le pubblicità e
+l'attività web e svolgere altre attività di <a
+href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">tracciamento
+su dispositivi multipli</a>.</p>
+ </li>
<li><p>I televisori “intelligenti” di Vizio riconoscono e <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">spiano
quello che gli utenti guardano</a>, persino se non si tratta di un canale
@@ -705,6 +767,7 @@
sorveglianza rimane comunque un abuso.</p>
<ul>
+
<li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">Le
applicazioni per immissione di testo Giapponese e Cinese di Baidu spiano i
@@ -742,6 +805,18 @@
</li>
</ul>
+<div class="big-subsection">
+ <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+ <span class="anchor-reference-id">(<a
+href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul>
+ <li><p>In Google Chrome è semplice per un'estensione fare <a
+href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy">spionaggio
+completo sulle attività dell'utente</a>, e molte estensioni lo fanno.</p>
+ </li>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInFlash">Spyware in Flash</h4>
@@ -841,7 +916,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/11/19 22:28:23 $
+$Date: 2015/12/13 07:42:47 $
<!-- timestamp end -->
</p>
Index: proprietary/po/proprietary-back-doors.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-back-doors.it-en.html 7 Dec 2015 00:28:35
-0000 1.6
+++ proprietary/po/proprietary-back-doors.it-en.html 13 Dec 2015 07:42:48
-0000 1.7
@@ -10,6 +10,20 @@
<p>Here are examples of demonstrated back doors in proprietary software.</p>
<ul>
+ <li>
+ <p>Microsoft
+ is <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">attacking
+ computers that run Windows 7 and 8</a>, switching on a flag that
+ says whether to “upgrade” to Windows 10 when users have turned
it
+ off.</p>
+
+ <p>This, by the way, reaffirms the presence of a universal back
+ door in Windows 7 and 8.</p>
+ </li>
+<li><p>ARRIS cable modem has a
+ <a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p>
+</li>
<li><p>Caterpillar vehicles come with
<a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
remotely.</p>
@@ -212,7 +226,7 @@
<ul>
<li>
-<p><a
href="http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
+<p><a
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI">
Writable microcode for Intel and AMD microprocessors</a> may be a vehicle
for the NSA to invade computers, with the help of Microsoft, say respected
security experts.
@@ -263,7 +277,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/07 00:28:35 $
+$Date: 2015/12/13 07:42:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-sabotage.it-en.html 24 Oct 2015 21:59:04
-0000 1.7
+++ proprietary/po/proprietary-sabotage.it-en.html 13 Dec 2015 07:42:48
-0000 1.8
@@ -12,6 +12,24 @@
worse than a back door.</p>
<ul>
+ <li>
+ <p>Whether you like it or not, Microsoft
+ is <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">forcibly
+ pushing Windows update to its version 10</a>, ignoring the flag on
+ Windows 7 or 8 that you could set to not upgrade. This reaffirms
+ the presence of
+ a <a href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a> 7 and 8.</p>
+ </li>
+ <li><p>Windows 10 “upgrades” <a
+
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
+ delete applications</a> without asking permission.</p>
+ </li>
+ <li><p>Google has long had <a
+
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+ back door to remotely unlock an Android device</a>, unless its
+ disk is encrypted (possible since Android 5.0 Lollipop, but
+ still not quite the default).</p></li>
<li><p>
Users report <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft is forcing them to replace Windows 7 and 8 with
@@ -218,7 +236,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/24 21:59:04 $
+$Date: 2015/12/13 07:42:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/proprietary-sabotage.it.po 12 Dec 2015 22:59:19 -0000
1.29
+++ proprietary/po/proprietary-sabotage.it.po 13 Dec 2015 07:42:48 -0000
1.30
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-11-26 14:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-surveillance.it-en.html 19 Nov 2015 22:28:23
-0000 1.12
+++ proprietary/po/proprietary-surveillance.it-en.html 13 Dec 2015 07:42:48
-0000 1.13
@@ -42,6 +42,7 @@
</li>
<li><a href="#SpywareOnTheRoad">Spyware on the Road</a>
<ul>
+ <li><a href="#SpywareInCameras">Spyware in Cameras</a></li>
<li><a href="#SpywareInElectronicReaders">Spyware in e-Readers</a></li>
<li><a href="#SpywareInVehicles">Spyware in Vehicles</a></li>
</ul>
@@ -53,6 +54,7 @@
</li>
<li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
<ul>
+ <li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
<li><a href="#SpywareInFlash">Spyware in Flash</a></li>
</ul>
</li>
@@ -105,6 +107,14 @@
</div>
<ul>
+ <li><p>A downgrade to Windows 10 deleted surveillance-detection
+ applications. Then another downgrade inserted a general spying
+ program. Users noticed this and complained, so Microsoft
+ renamed it
+ <a
href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">to
give users the impression it was gone</a>.</p>
+
+ <p>To use proprietary software is to invite such treatment.</p>
+ </li>
<li><p>
Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
ships with default settings that show no regard for the
@@ -216,6 +226,19 @@
</div>
<ul>
+ <li><p>“Cryptic communication,” unrelated to the app's
functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way to say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
+ </li>
<li><p>Gratis Android apps (but not <a href="/philosophy/free-sw.html">free
software</a>)
connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
@@ -379,6 +402,19 @@
</div>
<ul>
+ <li><p>Facebook's new Magic Photo app
+ <a
href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">scans
your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take according to who
+ is in the frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if the user didn't “upload” them to the
service.</p>
+ </li>
<li><p>Like most “music screaming” disservices, Spotify
is based on proprietary malware (DRM and snooping). In August
@@ -532,6 +568,20 @@
</div>
<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means the manufacturer is using it to
outsmart
+ you.</p>
+ </li>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
@@ -552,7 +602,6 @@
</li>
</ul>
-
<div class="big-subsection">
<h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
@@ -590,13 +639,6 @@
<div style="clear: left;"></div>
<ul>
- <li><p>Some web and TV advertisements play inaudible sounds to be
- picked up by proprietary malware running on other devices in
- range so as to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed to spy on their renters</a>.</p>
</li>
@@ -614,6 +656,20 @@
before Amazon “smart” TVs.</p>
<ul>
+ <li><p>Tivo's alliance with Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible sounds to be
+ picked up by proprietary malware running on other devices in
+ range so as to determine that they are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ </li>
<li><p>Vizio “smart” TVs recognize and
<a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
even if it isn't a TV channel.</p>
@@ -669,6 +725,7 @@
but the surveillance is an abuse all the same.</p>
<ul>
+
<li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
Baidu's Japanese-input and Chinese-input apps spy on users.</a></p>
</li>
@@ -703,6 +760,17 @@
</li>
</ul>
+<div class="big-subsection">
+ <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul>
+ <li><p>Google Chrome makes it easy for an extension to
+ do <a
href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy">total
+ snooping on the user's browsing</a>, and many of them do so.</p>
+ </li>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInFlash">Spyware in Flash</h4>
@@ -781,7 +849,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/11/19 22:28:23 $
+$Date: 2015/12/13 07:42:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary-surveillance.it.po 12 Dec 2015 22:59:19
-0000 1.62
+++ proprietary/po/proprietary-surveillance.it.po 13 Dec 2015 07:42:48
-0000 1.63
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-11-24 14:55+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -102,10 +101,7 @@
msgid "<a href=\"#SpywareOnTheRoad\">Spyware on the Road</a>"
msgstr "<a href=\"#SpywareOnTheRoad\">Spyware sulla strada</a>"
-# | <a [-href=\"#SpywareInGames\">Spyware-]
-# | {+href=\"#SpywareInCameras\">Spyware+} in [-Games</a>-] {+Cameras</a>+}
#. type: Content of: <div><ul><li><ul><li>
-#| msgid "<a href=\"#SpywareInGames\">Spyware in Games</a>"
msgid "<a href=\"#SpywareInCameras\">Spyware in Cameras</a>"
msgstr "<a href=\"#SpywareInCameras\">Spyware in fotocamere</a>"
@@ -129,10 +125,7 @@
msgid "<a href=\"#SpywareOnTheWeb\">Spyware on the Web</a>"
msgstr "<a href=\"#SpywareOnTheWeb\">Spyware sul web</a>"
-# | <a [-href=\"#SpywareInGames\">Spyware-]
-# | {+href=\"#SpywareInChrome\">Spyware+} in [-Games</a>-] {+Chrome</a>+}
#. type: Content of: <div><ul><li><ul><li>
-#| msgid "<a href=\"#SpywareInGames\">Spyware in Games</a>"
msgid "<a href=\"#SpywareInChrome\">Spyware in Chrome</a>"
msgstr "<a href=\"#SpywareInChrome\">Spyware in Chrome</a>"
@@ -1103,19 +1096,11 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareOnTheRoad"
"\">#SpywareOnTheRoad</a>)</span>"
-# | Spyware in [-Games-] {+Cameras+}
#. type: Content of: <div><h4>
-#| msgid "Spyware in Games"
msgid "Spyware in Cameras"
msgstr "Spyware in fotocamere"
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInGames\">#SpywareInGames</a>)</span>-]
-# | {+href=\"#SpywareInCameras\">#SpywareInCameras</a>)</span>+}
-#. type: Content of: <div>
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInGames"
-#| "\">#SpywareInGames</a>)</span>"
+#. type: Content of: <div>
msgid ""
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInCameras"
"\">#SpywareInCameras</a>)</span>"
@@ -1513,19 +1498,11 @@
"cloud-data-fbi-and-nsa/\">Microsoft SkyDrive permette all'NSA di esaminare "
"direttamente i dati degli utenti</a>."
-# | Spyware in [-Games-] {+Chrome+}
#. type: Content of: <div><h4>
-#| msgid "Spyware in Games"
msgid "Spyware in Chrome"
msgstr "Spyware in Chrome"
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInGames\">#SpywareInGames</a>)</span>-]
-# | {+href=\"#SpywareInChrome\">#SpywareInChrome</a>)</span>+}
-#. type: Content of: <div>
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInGames"
-#| "\">#SpywareInGames</a>)</span>"
+#. type: Content of: <div>
msgid ""
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInChrome"
"\">#SpywareInChrome</a>)</span>"
Index: server/sitemap.it.html
===================================================================
RCS file: /web/www/www/server/sitemap.it.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- server/sitemap.it.html 11 Dec 2015 18:01:15 -0000 1.41
+++ server/sitemap.it.html 13 Dec 2015 07:42:49 -0000 1.42
@@ -629,7 +629,7 @@
<dd>John Bokma's GNU Logos</dd>
<dt><a
href="/graphics/bold-initiative-GNU-head.html">bold-initiative-GNU-head.html</a></dt>
- <dd>Winking GNU</dd>
+ <dd>GNU che fa l'occhiolino</dd>
<dt><a href="/graphics/BVBN.html">BVBN.html</a></dt>
<dd>GNU Art by Vladimir Tsarkov</dd>
<dt><a href="/graphics/bwcartoon.html">bwcartoon.html</a></dt>
@@ -2006,7 +2006,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2015/12/11 18:01:15 $
+$Date: 2015/12/13 07:42:49 $
<!-- timestamp end -->
</p>
Index: server/po/sitemap.it-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.it-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- server/po/sitemap.it-en.html 10 Nov 2015 22:58:32 -0000 1.20
+++ server/po/sitemap.it-en.html 13 Dec 2015 07:42:49 -0000 1.21
@@ -627,6 +627,8 @@
<dd>Baby GNU</dd>
<dt><a href="/graphics/bokma-gnu.html">bokma-gnu.html</a></dt>
<dd>John Bokma's GNU Logos</dd>
+ <dt><a
href="/graphics/bold-initiative-GNU-head.html">bold-initiative-GNU-head.html</a></dt>
+ <dd>Winking GNU</dd>
<dt><a href="/graphics/BVBN.html">BVBN.html</a></dt>
<dd>GNU Art by Vladimir Tsarkov</dd>
<dt><a href="/graphics/bwcartoon.html">bwcartoon.html</a></dt>
@@ -727,6 +729,8 @@
<dd>GNU banner: run free run GNU</dd>
<dt><a href="/graphics/scowcroft.html">scowcroft.html</a></dt>
<dd>GNU Characters</dd>
+ <dt><a href="/graphics/skwetu-gnu-logo.html">skwetu-gnu-logo.html</a></dt>
+ <dd>Skwetu's GNU Logo</dd>
<dt><a href="/graphics/slickgnu.html">slickgnu.html</a></dt>
<dd>A slick GNU logo by Brian Bush</dd>
<dt><a href="/graphics/social.html">social.html</a></dt>
@@ -1885,7 +1889,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/11/10 22:58:32 $
+$Date: 2015/12/13 07:42:49 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.it.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.it.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- server/po/sitemap.it.po 12 Dec 2015 22:59:18 -0000 1.60
+++ server/po/sitemap.it.po 13 Dec 2015 07:42:49 -0000 1.61
@@ -14,7 +14,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-12-11 17:56+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -2211,9 +2210,7 @@
msgid "<a href=\"/graphics/skwetu-gnu-logo.html\">skwetu-gnu-logo.html</a>"
msgstr "<a href=\"/graphics/skwetu-gnu-logo.html\">skwetu-gnu-logo.html</a>"
-# | [-John Bokma's-]{+Skwetu's+} GNU Logo[-s-]
#. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "John Bokma's GNU Logos"
msgid "Skwetu's GNU Logo"
msgstr "Skwetu's GNU Logo"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www proprietary/proprietary-back-doors.it.html ...,
GNUN <=