www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/proprietary-back-doors.it.html ...


From: GNUN
Subject: www proprietary/proprietary-back-doors.it.html ...
Date: Sun, 13 Dec 2015 07:42:50 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/12/13 07:42:49

Modified files:
        proprietary    : proprietary-back-doors.it.html 
                         proprietary-sabotage.it.html 
                         proprietary-surveillance.it.html 
        proprietary/po : proprietary-back-doors.it-en.html 
                         proprietary-sabotage.it-en.html 
                         proprietary-sabotage.it.po 
                         proprietary-surveillance.it-en.html 
                         proprietary-surveillance.it.po 
        server         : sitemap.it.html 
        server/po      : sitemap.it-en.html sitemap.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.it.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.it.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it-en.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it.po?cvsroot=www&r1=1.60&r2=1.61

Patches:
Index: proprietary/proprietary-back-doors.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-back-doors.it.html  7 Dec 2015 00:28:35 -0000       
1.6
+++ proprietary/proprietary-back-doors.it.html  13 Dec 2015 07:42:46 -0000      
1.7
@@ -17,6 +17,20 @@
 software proprietario.</p>
 
 <ul>
+  <li>
+    <p>Microsoft sta <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>attaccando
+i computer con Windows 7 e 8</a>, attivando un interruttore che dice se
+&ldquo;aggiornare&rdquo; a Windows 10 anche quando gli utenti lo hanno
+disattivato.</p>
+
+    <p>Questa, tra l'altro, è un'ulteriore conferma della presenza di una 
backdoor
+in Windows 7 e 8.</p>
+  </li>
+<li><p>Il modem via cavo ARRIS ha una <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1";>
+backdoor nella backdoor</a>.</p>
+</li>
   <li><p>I veicoli caterpillar hanno una <a
 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>back-door
 che spegne il motore</a> da remoto.</p>
@@ -233,7 +247,7 @@
 <ul>
 <li>
 <p>A detta di rispettati esperti di sicurezza informatica, <a
-href="http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>il
+href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>il
 microcodice scrivibile per processori Intel ed AMD</a> può essere un veicolo
 attraverso cui l'NSA può invadere i computer, con l'aiuto di Microsoft.
 </p>
@@ -304,7 +318,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/12/07 00:28:35 $
+$Date: 2015/12/13 07:42:46 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.it.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/proprietary-sabotage.it.html    24 Oct 2015 21:59:02 -0000      
1.7
+++ proprietary/proprietary-sabotage.it.html    13 Dec 2015 07:42:46 -0000      
1.8
@@ -17,6 +17,22 @@
 di una backdoor.</p>
 
 <ul>
+  <li>
+    <p>Che vi piaccia o no, Microsoft sta <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>costringendo
+gli utenti ad aggiornare a Windows 10</a>, ignorando la preferenza in
+Windows 7 e 8 che si poteva usare per non aggiornare. Questa è un'ulteriore
+conferma della <a href="/proprietary/proprietary-back-doors.html">presenza
+di una backdoor in Windows</a> 7 e 8.</p>
+  </li>
+  <li><p>Gli "aggiornamenti" di Windows 10 <a
+href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
+cancellano applicazioni</a> senza chiedere il permesso.</p>
+  </li>
+  <li><p>Google da tempo ha una <a
+href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>back
+door per sbloccare da remoto un dispositivo Android</a>, a meno che il suo
+disco non sia criptato (opzione possibile da Android 5.0 Lollipop).</p></li>
 <li><p>
 Alcuni utenti segnalano che <a
 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
@@ -263,7 +279,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/24 21:59:02 $
+$Date: 2015/12/13 07:42:46 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/proprietary-surveillance.it.html        19 Nov 2015 22:28:23 
-0000      1.12
+++ proprietary/proprietary-surveillance.it.html        13 Dec 2015 07:42:47 
-0000      1.13
@@ -48,6 +48,7 @@
     </li>
     <li><a href="#SpywareOnTheRoad">Spyware sulla strada</a>
       <ul>
+        <li><a href="#SpywareInCameras">Spyware in fotocamere</a></li>
     <li><a href="#SpywareInElectronicReaders">Spyware nei lettori 
e-book</a></li>
     <li><a href="#SpywareInVehicles">Spyware nei veicoli</a></li>
       </ul>
@@ -59,6 +60,7 @@
     </li>
     <li><a href="#SpywareOnTheWeb">Spyware sul web</a>
       <ul>
+        <li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
     <li><a href="#SpywareInFlash">Spyware in Flash</a></li>
       </ul>
     </li>
@@ -108,6 +110,15 @@
 </div>
 
 <ul>
+  <li><p>Un "peggioramento" (mascherato da aggiornamento) di Windows 10 ha 
cancellato
+applicazioni che rilevavano la sorveglianza. Un ulteriore "aggiornamento" ha
+inserito un programma di spionaggio. Gli utenti lo hanno notato e si sono
+lamentati, quindi Microsoft ne ha <a
+href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>cambiato
+il nome</a> affinché gli utenti credessero che era stato eliminato.</p>
+
+      <p>Chi usa software proprietario si espone ad essere trattato in questo 
modo.</p>
+  </li>
   <li><p>
   Windows 10 <a
 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
@@ -228,6 +239,22 @@
 </div>
 
 <ul>
+  <li><p>Sono state trovate attività di &ldquo;comunicazione non 
chiara&rdquo;, non
+collegata all'attività dell'applicazione, <a
+href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
+nelle 500 applicazioni gratuite per Android più diffuse</a>.</p>
+
+  <p>L'articolo è in inglese e usa &ldquo;free&rdquo; nel senso di
+&ldquo;gratuito&rdquo;; dato che &ldquo;free&rdquo; significa anche
+&ldquo;libero&rdquo;, in inglese preferiamo che si usi &ldquo;gratis&rdquo;
+in questi casi.</p>
+
+  <p>L'articolo dà per scontato che gli strumenti di analisi comuni siano
+legittimi, ma questo è vero? Gli sviluppatori di software non hanno il
+diritto di analizzare quello che gli utenti fanno o come lo fanno. Gli
+strumenti di "statistica" che spiano sono sbagliati come qualsiasi altro
+sistema di spionaggio.</p>
+  </li>
   <li><p>Le applicazioni gratuite per Android (gratuite, ma non <a
 href="/philosophy/free-sw.html">libere</a>)  si collegano in media a 100
 indirizzi di <a
@@ -396,6 +423,19 @@
 </div>
 
 <ul>
+  <li><p>La nuova applicazione di Facebook, Magic Photo, <a
+href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>cerca
+volti ad essa noti nelle raccolte di foto del vostro telefono</a>, e vi
+suggerisce di condividere la foto secondo la persona che trova
+nell'inquadratura.</p>
+
+      <p>Questa funzione spia ha probabilmente accesso a qualche database 
centrale, e
+quindi probabilmente le foto vengono inviate tramite la rete ai server di
+Facebook e ai suoi algoritmi di riconoscimento.</p>
+
+      <p>Ma allora nessuna delle foto degli utenti di Facebook è privata, 
nemmeno se
+l'utente ha evitato di "caricarla" sul servizio.</p>
+  </li>
 
   <li><p>Come molti servizi di streaming (che noi preferiamo chiamare 
"disservizi di
 screaming", urlare) Spotify è basato su malware proprietario (DRM e
@@ -556,6 +596,22 @@
 </div>
 <div style="clear: left;"></div>
 
+<div class="big-subsection">
+  <h4 id="SpywareInCameras">Spyware in fotocamere</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+  <li>
+    <p>La macchina fotografica "intelligente" Nest Cam è <a
+href="http://www.bbc.com/news/technology-34922712";>sempre attiva</a>, anche
+quando il suo &ldquo;proprietario&rdquo; pensa di averla spenta.</p>
+    <p>Quando un dispositivo è "smart" o "intelligente" in realtà è il suo
+produttore che sta cercando di essere più "smart" o "intelligente" degli
+utenti.</p>
+  </li>
+</ul>
 
 <div class="big-subsection">
   <h4 id="SpywareInElectronicReaders">Spyware nei lettori e-book</h4>
@@ -577,7 +633,6 @@
   </li>
 </ul>
 
-
 <div class="big-subsection">
   <h4 id="SpywareInVehicles">Spyware nei veicoli</h4>
   <span class="anchor-reference-id">(<a
@@ -616,15 +671,6 @@
 <div style="clear: left;"></div>
 
 <ul>
-  <li><p>Alcune pubblicità trasmesse via web e TV contengono suoni che non 
sono
-udibili dall'orecchio umano ma sono catturati da malware proprietario che è
-in esecuzione su altri dispositivi che si trovano nelle vicinanze. Una volta
-che i vostri dispositivi Internet sono stati associati alla vostra TV con
-questa tecnica, le aziende possono studiare correlazioni tra le pubblicità e
-l'attività web e svolgere altre attività di <a
-href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>tracciamento
-su dispositivi multipli</a>.</p>
-  </li>
   <li><p><a
 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm";>Dei
 computer dati in "affitto con riscatto" sono stati programmati per
@@ -646,6 +692,22 @@
 &ldquo;smart&rdquo; TV di Amazon.</p>
 
 <ul>
+  <li><p>L'alleanza di Tivo con Viacom aggiunge 2.3 milioni di famiglie ai 600
+milioni di profili social che l'azienda già controlla. I clienti di Tivo non
+sanno che gli inserzionisti li stanno guardando. Combinando le informazioni
+sulla fruizione televisiva con la partecipazione nei social, Tivo ora può <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>correlare
+la pubblicità in TV con gli acquisti</a>, esponendo tutti gli utenti a una
+nuova forma di sorveglianza combinata.</p></li>
+  <li><p>Alcune pubblicità trasmesse via web e TV contengono suoni che non 
sono
+udibili dall'orecchio umano ma sono catturati da malware proprietario che è
+in esecuzione su altri dispositivi che si trovano nelle vicinanze. Una volta
+che i vostri dispositivi Internet sono stati associati alla vostra TV con
+questa tecnica, le aziende possono studiare correlazioni tra le pubblicità e
+l'attività web e svolgere altre attività di <a
+href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>tracciamento
+su dispositivi multipli</a>.</p>
+  </li>
   <li><p>I televisori &ldquo;intelligenti&rdquo; di Vizio riconoscono e <a
 href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>spiano
 quello che gli utenti guardano</a>, persino se non si tratta di un canale
@@ -705,6 +767,7 @@
 sorveglianza rimane comunque un abuso.</p>
 
 <ul>
+
   <li><p><a
 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/";>Le
 applicazioni per immissione di testo Giapponese e Cinese di Baidu spiano i
@@ -742,6 +805,18 @@
   </li>
 </ul>
 
+<div class="big-subsection">
+  <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul>
+  <li><p>In Google Chrome è semplice per un'estensione fare <a
+href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy";>spionaggio
+completo sulle attività dell'utente</a>, e molte estensioni lo fanno.</p>
+  </li>
+</ul>
 
 <div class="big-subsection">
   <h4 id="SpywareInFlash">Spyware in Flash</h4>
@@ -841,7 +916,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/11/19 22:28:23 $
+$Date: 2015/12/13 07:42:47 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/proprietary-back-doors.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-back-doors.it-en.html    7 Dec 2015 00:28:35 
-0000       1.6
+++ proprietary/po/proprietary-back-doors.it-en.html    13 Dec 2015 07:42:48 
-0000      1.7
@@ -10,6 +10,20 @@
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
 <ul>
+  <li>
+    <p>Microsoft
+    is <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>attacking
+    computers that run Windows 7 and 8</a>, switching on a flag that
+    says whether to &ldquo;upgrade&rdquo; to Windows 10 when users have turned 
it
+    off.</p>
+
+    <p>This, by the way, reaffirms the presence of a universal back
+      door in Windows 7 and 8.</p>
+  </li>
+<li><p>ARRIS cable modem has a
+  <a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1";>
+  backdoor in the backdoor</a>.</p>
+</li>
   <li><p>Caterpillar vehicles come with
      <a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it";>a
 back-door to shutoff the engine</a>
      remotely.</p>
@@ -212,7 +226,7 @@
 
 <ul>
 <li>
-<p><a 
href="http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
+<p><a 
href="http://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI";>
 Writable microcode for Intel and AMD microprocessors</a> may be a vehicle
 for the NSA to invade computers, with the help of Microsoft, say respected
 security experts.
@@ -263,7 +277,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/12/07 00:28:35 $
+$Date: 2015/12/13 07:42:48 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-sabotage.it-en.html      24 Oct 2015 21:59:04 
-0000      1.7
+++ proprietary/po/proprietary-sabotage.it-en.html      13 Dec 2015 07:42:48 
-0000      1.8
@@ -12,6 +12,24 @@
 worse than a back door.</p>
 
 <ul>
+  <li>
+    <p>Whether you like it or not, Microsoft
+    is <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>forcibly
+    pushing Windows update to its version 10</a>, ignoring the flag on
+    Windows 7 or 8 that you could set to not upgrade.  This reaffirms
+    the presence of
+    a <a href="/proprietary/proprietary-back-doors.html">universal
+    back door in Windows</a> 7 and 8.</p>
+  </li>
+  <li><p>Windows 10 &ldquo;upgrades&rdquo; <a
+      
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
+      delete applications</a> without asking permission.</p>
+  </li>
+  <li><p>Google has long had <a
+      
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted";>a
+      back door to remotely unlock an Android device</a>, unless its
+      disk is encrypted (possible since Android 5.0 Lollipop, but
+      still not quite the default).</p></li>
 <li><p>
 Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
 Microsoft is forcing them to replace Windows 7 and 8 with
@@ -218,7 +236,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/24 21:59:04 $
+$Date: 2015/12/13 07:42:48 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/proprietary-sabotage.it.po   12 Dec 2015 22:59:19 -0000      
1.29
+++ proprietary/po/proprietary-sabotage.it.po   13 Dec 2015 07:42:48 -0000      
1.30
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-11-26 14:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-surveillance.it-en.html  19 Nov 2015 22:28:23 
-0000      1.12
+++ proprietary/po/proprietary-surveillance.it-en.html  13 Dec 2015 07:42:48 
-0000      1.13
@@ -42,6 +42,7 @@
     </li>
     <li><a href="#SpywareOnTheRoad">Spyware on the Road</a>
       <ul>
+        <li><a href="#SpywareInCameras">Spyware in Cameras</a></li>
     <li><a href="#SpywareInElectronicReaders">Spyware in e-Readers</a></li>
     <li><a href="#SpywareInVehicles">Spyware in Vehicles</a></li>
       </ul>
@@ -53,6 +54,7 @@
     </li>
     <li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
       <ul>
+        <li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
     <li><a href="#SpywareInFlash">Spyware in Flash</a></li>
       </ul>
     </li>
@@ -105,6 +107,14 @@
 </div>
 
 <ul>
+  <li><p>A downgrade to Windows 10 deleted surveillance-detection
+      applications.  Then another downgrade inserted a general spying
+      program.  Users noticed this and complained, so Microsoft
+      renamed it
+      <a 
href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>to
 give users the impression it was gone</a>.</p>
+
+      <p>To use proprietary software is to invite such treatment.</p>
+  </li>
   <li><p>
   Windows 10 <a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/";>
   ships with default settings that show no regard for the
@@ -216,6 +226,19 @@
 </div>
 
 <ul>
+  <li><p>&ldquo;Cryptic communication,&rdquo; unrelated to the app's 
functionality,
+  was <a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119";>
+  found in the 500 most popular gratis Android apps</a>.</p>
+
+  <p>The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;</p>
+
+  <p>The article takes for granted that the usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.</p>
+  </li>
   <li><p>Gratis Android apps (but not <a href="/philosophy/free-sw.html">free 
software</a>)
       connect to 100
       <a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites";>tracking
 and advertising</a> URLs,
@@ -379,6 +402,19 @@
 </div>
 
 <ul>
+  <li><p>Facebook's new Magic Photo app
+      <a 
href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>scans
 your mobile phone's photo collections for known faces</a>,
+      and suggests you to share the picture you take according to who
+      is in the frame.</p>
+
+      <p>This spyware feature seems to require online access to some
+      known-faces database, which means the pictures are likely to be
+      sent across the wire to Facebook's servers and face-recognition
+      algorithms.</p>
+
+      <p>If so, none of Facebook users' pictures are private
+      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.</p>
+  </li>
 
   <li><p>Like most &ldquo;music screaming&rdquo; disservices, Spotify
       is based on proprietary malware (DRM and snooping). In August
@@ -532,6 +568,20 @@
 </div>
 <div style="clear: left;"></div>
 
+<div class="big-subsection">
+  <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+  <li>
+    <p>The Nest Cam &ldquo;smart&rdquo; camera is <a
+      href="http://www.bbc.com/news/technology-34922712";>always
+        watching</a>, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;</p>
+    <p>A &ldquo;smart&rdquo; device means the manufacturer is using it to 
outsmart
+      you.</p>
+  </li>
+</ul>
 
 <div class="big-subsection">
   <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
@@ -552,7 +602,6 @@
   </li>
 </ul>
 
-
 <div class="big-subsection">
   <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
   <span class="anchor-reference-id">(<a 
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
@@ -590,13 +639,6 @@
 <div style="clear: left;"></div>
 
 <ul>
-  <li><p>Some web and TV advertisements play inaudible sounds to be
-      picked up by proprietary malware running on other devices in
-      range so as to determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other <a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>cross-device
 tracking</a>.</p>
-  </li>
   <li><p><a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm";>
       Rent-to-own computers were programmed to spy on their renters</a>.</p>
   </li>
@@ -614,6 +656,20 @@
 before Amazon &ldquo;smart&rdquo; TVs.</p>
 
 <ul>
+  <li><p>Tivo's alliance with Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now <a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102";>correlate
 TV
+      advertisement with online purchases</a>, exposing all users to
+      new combined surveillance by default.</p></li>
+  <li><p>Some web and TV advertisements play inaudible sounds to be
+      picked up by proprietary malware running on other devices in
+      range so as to determine that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other <a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/";>cross-device
 tracking</a>.</p>
+  </li>
   <li><p>Vizio &ldquo;smart&rdquo; TVs recognize and
       <a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/";>track what 
people are watching</a>,
       even if it isn't a TV channel.</p>
@@ -669,6 +725,7 @@
    but the surveillance is an abuse all the same.</p>
 
 <ul>
+
   <li><p><a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/";>
       Baidu's Japanese-input and Chinese-input apps spy on users.</a></p>
   </li>
@@ -703,6 +760,17 @@
   </li>
 </ul>
 
+<div class="big-subsection">
+  <h4 id="SpywareInChrome">Spyware in Chrome</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul>
+  <li><p>Google Chrome makes it easy for an extension to
+      do <a 
href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy";>total
+      snooping on the user's browsing</a>, and many of them do so.</p>
+  </li>
+</ul>
 
 <div class="big-subsection">
   <h4 id="SpywareInFlash">Spyware in Flash</h4>
@@ -781,7 +849,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/11/19 22:28:23 $
+$Date: 2015/12/13 07:42:48 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary-surveillance.it.po       12 Dec 2015 22:59:19 
-0000      1.62
+++ proprietary/po/proprietary-surveillance.it.po       13 Dec 2015 07:42:48 
-0000      1.63
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-11-24 14:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -102,10 +101,7 @@
 msgid "<a href=\"#SpywareOnTheRoad\">Spyware on the Road</a>"
 msgstr "<a href=\"#SpywareOnTheRoad\">Spyware sulla strada</a>"
 
-# | <a [-href=\"#SpywareInGames\">Spyware-]
-# | {+href=\"#SpywareInCameras\">Spyware+} in [-Games</a>-] {+Cameras</a>+}
 #. type: Content of: <div><ul><li><ul><li>
-#| msgid "<a href=\"#SpywareInGames\">Spyware in Games</a>"
 msgid "<a href=\"#SpywareInCameras\">Spyware in Cameras</a>"
 msgstr "<a href=\"#SpywareInCameras\">Spyware in fotocamere</a>"
 
@@ -129,10 +125,7 @@
 msgid "<a href=\"#SpywareOnTheWeb\">Spyware on the Web</a>"
 msgstr "<a href=\"#SpywareOnTheWeb\">Spyware sul web</a>"
 
-# | <a [-href=\"#SpywareInGames\">Spyware-]
-# | {+href=\"#SpywareInChrome\">Spyware+} in [-Games</a>-] {+Chrome</a>+}
 #. type: Content of: <div><ul><li><ul><li>
-#| msgid "<a href=\"#SpywareInGames\">Spyware in Games</a>"
 msgid "<a href=\"#SpywareInChrome\">Spyware in Chrome</a>"
 msgstr "<a href=\"#SpywareInChrome\">Spyware in Chrome</a>"
 
@@ -1103,19 +1096,11 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareOnTheRoad"
 "\">#SpywareOnTheRoad</a>)</span>"
 
-# | Spyware in [-Games-] {+Cameras+}
 #. type: Content of: <div><h4>
-#| msgid "Spyware in Games"
 msgid "Spyware in Cameras"
 msgstr "Spyware in fotocamere"
 
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInGames\">#SpywareInGames</a>)</span>-]
-# | {+href=\"#SpywareInCameras\">#SpywareInCameras</a>)</span>+}
-#. type: Content of: <div>
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInGames"
-#| "\">#SpywareInGames</a>)</span>"
+#. type: Content of: <div>
 msgid ""
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInCameras"
 "\">#SpywareInCameras</a>)</span>"
@@ -1513,19 +1498,11 @@
 "cloud-data-fbi-and-nsa/\">Microsoft SkyDrive permette all'NSA di esaminare "
 "direttamente i dati degli utenti</a>."
 
-# | Spyware in [-Games-] {+Chrome+}
 #. type: Content of: <div><h4>
-#| msgid "Spyware in Games"
 msgid "Spyware in Chrome"
 msgstr "Spyware in Chrome"
 
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInGames\">#SpywareInGames</a>)</span>-]
-# | {+href=\"#SpywareInChrome\">#SpywareInChrome</a>)</span>+}
-#. type: Content of: <div>
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInGames"
-#| "\">#SpywareInGames</a>)</span>"
+#. type: Content of: <div>
 msgid ""
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInChrome"
 "\">#SpywareInChrome</a>)</span>"

Index: server/sitemap.it.html
===================================================================
RCS file: /web/www/www/server/sitemap.it.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- server/sitemap.it.html      11 Dec 2015 18:01:15 -0000      1.41
+++ server/sitemap.it.html      13 Dec 2015 07:42:49 -0000      1.42
@@ -629,7 +629,7 @@
   <dd>John Bokma's GNU Logos</dd>
   <dt><a
 
href="/graphics/bold-initiative-GNU-head.html">bold-initiative-GNU-head.html</a></dt>
-  <dd>Winking GNU</dd>
+  <dd>GNU che fa l'occhiolino</dd>
   <dt><a href="/graphics/BVBN.html">BVBN.html</a></dt>
   <dd>GNU Art by Vladimir Tsarkov</dd>
   <dt><a href="/graphics/bwcartoon.html">bwcartoon.html</a></dt>
@@ -2006,7 +2006,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/12/11 18:01:15 $
+$Date: 2015/12/13 07:42:49 $
 
 <!-- timestamp end -->
 </p>

Index: server/po/sitemap.it-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.it-en.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- server/po/sitemap.it-en.html        10 Nov 2015 22:58:32 -0000      1.20
+++ server/po/sitemap.it-en.html        13 Dec 2015 07:42:49 -0000      1.21
@@ -627,6 +627,8 @@
   <dd>Baby GNU</dd>
   <dt><a href="/graphics/bokma-gnu.html">bokma-gnu.html</a></dt>
   <dd>John Bokma's GNU Logos</dd>
+  <dt><a 
href="/graphics/bold-initiative-GNU-head.html">bold-initiative-GNU-head.html</a></dt>
+  <dd>Winking GNU</dd>
   <dt><a href="/graphics/BVBN.html">BVBN.html</a></dt>
   <dd>GNU Art by Vladimir Tsarkov</dd>
   <dt><a href="/graphics/bwcartoon.html">bwcartoon.html</a></dt>
@@ -727,6 +729,8 @@
   <dd>GNU banner: run free run GNU</dd>
   <dt><a href="/graphics/scowcroft.html">scowcroft.html</a></dt>
   <dd>GNU Characters</dd>
+  <dt><a href="/graphics/skwetu-gnu-logo.html">skwetu-gnu-logo.html</a></dt>
+  <dd>Skwetu's GNU Logo</dd>
   <dt><a href="/graphics/slickgnu.html">slickgnu.html</a></dt>
   <dd>A slick GNU logo by Brian Bush</dd>
   <dt><a href="/graphics/social.html">social.html</a></dt>
@@ -1885,7 +1889,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/11/10 22:58:32 $
+$Date: 2015/12/13 07:42:49 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.it.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.it.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- server/po/sitemap.it.po     12 Dec 2015 22:59:18 -0000      1.60
+++ server/po/sitemap.it.po     13 Dec 2015 07:42:49 -0000      1.61
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-12-11 17:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -2211,9 +2210,7 @@
 msgid "<a href=\"/graphics/skwetu-gnu-logo.html\">skwetu-gnu-logo.html</a>"
 msgstr "<a href=\"/graphics/skwetu-gnu-logo.html\">skwetu-gnu-logo.html</a>"
 
-# | [-John Bokma's-]{+Skwetu's+} GNU Logo[-s-]
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "John Bokma's GNU Logos"
 msgid "Skwetu's GNU Logo"
 msgstr "Skwetu's GNU Logo"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]