[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-surveillance.ja.htm...
From: |
GNUN |
Subject: |
www/proprietary proprietary-surveillance.ja.htm... |
Date: |
Sat, 25 Mar 2017 22:59:38 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/03/25 22:59:38
Modified files:
proprietary : proprietary-surveillance.ja.html
proprietary/po : proprietary-surveillance.ja-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ja.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.1&r2=1.2
Patches:
Index: proprietary-surveillance.ja.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ja.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-surveillance.ja.html 24 Jan 2017 03:40:30 -0000 1.29
+++ proprietary-surveillance.ja.html 26 Mar 2017 02:59:37 -0000 1.30
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-surveillance.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-surveillance.ja.po">
+ https://www.gnu.org/proprietary/po/proprietary-surveillance.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-surveillance.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-surveillance.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-surveillance.en.html" -->
<!--#include virtual="/server/header.ja.html" -->
<!-- Parent-Version: 1.79 -->
@@ -30,6 +35,7 @@
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
<!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
<h2>ãããã©ã¤ã¨ã¿ãªãªç£è¦</h2>
<p>ä¸èªç±ãª(ãããã©ã¤ã¨ã¿ãªãª)ã½ããã¦ã§ã¢ã¯å®ã«å¤ãã®å
´åãã«ã¦ã§ã¢ã§ã(ã¦ã¼ã¶ãèå¾
ããããã«è¨è¨
@@ -926,7 +932,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2017/01/24 03:40:30 $
+$Date: 2017/03/26 02:59:37 $
<!-- timestamp end -->
</p>
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-surveillance.ja-diff.html 30 Jun 2016 15:59:44 -0000
1.1
+++ po/proprietary-surveillance.ja-diff.html 26 Mar 2017 02:59:38 -0000
1.2
@@ -11,14 +11,57 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.77</strong></del></span> <span
class="inserted"><ins><em>1.79</em></ins></span> -->
+<!-- Parent-Version: 1.79 -->
<title>Proprietary Surveillance - GNU Project - Free Software
Foundation</title>
+<style type="text/css" media="print,screen"><!--
+.announcement {
+ background: none;
+}
+#surveillance div.toc {
+ width: 24.5em; max-width: 94%;
+ margin-bottom: 1em;
+}
address@hidden (min-width: 48em) {
+ #surveillance div.toc {
+ float: left;
+ width: auto; max-width: 48%;
+ margin: .2em 0 1em;
+ }
+ #surveillance .medium {
+ width: 43%;
+ margin: 7em 0 1em 1.5em;
+ }
+}
+--></style>
+<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/proprietary/po/proprietary-surveillance.translist"
-->
<!--#include virtual="/server/banner.html" -->
+
<h2>Proprietary Surveillance</h2>
-<p><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary.html"></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary.html"></em></ins></span>
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
+<div class="announcement">
+<p>This document attempts to
+track <strong>clearly established cases of proprietary software that
+spies on or tracks users</strong>.</p>
+
+<p><a href="/proprietary/proprietary.html">
Other examples of proprietary malware</a></p>
+</div>
+
+<div id="surveillance">
+
+<div class="pict medium">
+<a href="/graphics/dog.html">
+<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
+<p>“How did they find out I'm a dog?”</p>
+</div>
<div class="toc">
<h3 id="TableOfContents">Table of Contents</h3>
@@ -71,8 +114,12 @@
</ul>
</li>
<li><a href="#SpywareEverywhere">Spyware
Everywhere</a></li>
+ <li><a href="#SpywareInVR">Spyware In VR</a></li>
</ul>
-</div><!-- /class="toc" -->
+</div>
+
+</div>
+<div style="clear: left;"></div>
<!-- #Introduction -->
@@ -83,11 +130,11 @@
<p>For decades, the Free Software movement has been denouncing the
abusive surveillance machine of
-<a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary.html">proprietary</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary.html">proprietary</em></ins></span>
software</a>
+<a href="/proprietary/proprietary.html">proprietary software</a>
companies such as
-<a <span
class="removed"><del><strong>href="/philosophy/proprietary/malware-microsoft.html">Microsoft</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></em></ins></span>
+<a href="/proprietary/malware-microsoft.html">Microsoft</a>
and
-<a <span
class="removed"><del><strong>href="/philosophy/proprietary/malware-apple.html">Apple</a>.</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a>.</em></ins></span>
+<a href="/proprietary/malware-apple.html">Apple</a>.
In the recent years, this tendency to watch people has spread across
industries, not only in the software business, but also in the
@@ -95,10 +142,27 @@
keyboard, in the mobile computing industry, in the office, at home, in
transportation systems, and in the classroom.</p>
-<p class="highlight-para">This document attempts to
-track <strong>clearly established cases of proprietary software that
-spies on or track users</strong>.</p>
+<h3 id="AggregateInfoCollection">Aggregate Information
Collection</h3>
+<p>Many companies, in their privacy policy, have a clause that claims
+they share aggregate, non-personally identifiable information with
+third parties/partners. Such claims are worthless, for several
+reasons:</p>
+
+<ul>
+ <li>They could change the policy at any time.</li>
+ <li>They can twist the words by distributing an
“aggregate” of
+ “anonymized” data which can be reidentified and attributed
to
+ individuals.</li>
+ <li>The raw data they don't normally distribute can be taken by
+ data breaches.</li>
+ <li>The raw data they don't normally distribute can be taken by
+ subpoena.</li>
+</ul>
+
+<p>Therefore, we must never pay any attention to what companies say
+they will <em>do</em> with the data they collect. The wrong is that
+they collect it at all.</p>
<h3 id="LatestAdditions">Latest additions</h3>
@@ -120,6 +184,24 @@
</div>
<ul>
+ <span class="inserted"><ins><em><li><p>Windows DRM
+ files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
+ be used to identify people browsing through Tor</a>. The
+ vulnerability exists only if you use Windows.
+ </p></li></em></ins></span>
+
+ <li><p>By default, Windows 10 <a
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties">sends
+ debugging information to Microsoft, including core dumps</a>.
Microsoft now distributes them to another company.</p></li>
+
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
+
+<li>In order to increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice and privacy</a>.
+</li>
+
<li><p><a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
Windows 10 comes with 13 screens of snooping options</a>, all
enabled by default,
and turning them off would be daunting to most
users.</p></li>
@@ -135,9 +217,9 @@
applications. Then another downgrade inserted a general spying
program. Users noticed this and complained, so Microsoft
renamed it
- <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">to</strong></del></span>
-<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
-to</em></ins></span> give users the impression it was gone</a>.</p>
+ <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+to give users the impression it was gone</a>.</p>
<p>To use proprietary software is to invite such
treatment.</p>
</li>
@@ -183,7 +265,7 @@
voice input.</p>
</li>
- <li><p><a <span
class="removed"><del><strong>href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></em></ins></span>
+ <li><p><a
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches.</a>.</p>
</li>
@@ -194,7 +276,7 @@
</ul>
<p>Microsoft's snooping on users did not start with Windows 10.
- There's a lot more <a <span
class="removed"><del><strong>href="/philosophy/proprietary/malware-microsoft.html"></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"></em></ins></span>
+ There's a lot more <a href="/proprietary/malware-microsoft.html">
Microsoft malware</a>.</p>
@@ -243,7 +325,7 @@
</ul>
<p>There's a lot more <a href="#SpywareIniThings">iThing
spyware</a>, and
-<a <span
class="removed"><del><strong>href="/philosophy/proprietary/malware-apple.html">Apple</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</em></ins></span>
malware</a>.</p>
+<a href="/proprietary/malware-apple.html">Apple
malware</a>.</p>
<div class="big-subsection">
@@ -286,7 +368,7 @@
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
- <li><p><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-back-doors.html#samsung"></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#samsung"></em></ins></span>
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the
system.</p>
</li>
</ul>
@@ -309,13 +391,30 @@
</div>
<ul>
+ <span class="inserted"><ins><em><li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether the phone is snooping on
+ them.</p></li></em></ins></span>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data to Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
+ days.</p>
+ </li>
+
<li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
without giving a valid email address and receiving the code Apple
sends to it.</p>
</li>
<li><p>Around 47% of the most popular iOS apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
+ href="http://jots.pub/a/2015103001/index.php">share personal,
behavioral and location information</a> of their users with third
parties.</p>
</li>
@@ -346,10 +445,10 @@
</p></li>
<li><p>Spyware in iThings:
- the <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ the <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is,
and get other info too.</p>
- <span class="removed"><del><strong><!--
http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html
--></strong></del></span>
</li>
<li><p>There is also a feature for web sites to track users,
which is
@@ -359,8 +458,8 @@
</li>
<li><p>The iThing also
- <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"></strong></del></span>
-<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"></em></ins></span>
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
turned off.</p>
</li>
@@ -407,7 +506,7 @@
kind.</p></li>
<li><p>A Motorola phone
- <a
href="https://www.motorola.com/us/X8-Mobile-Computing-System/x8-mobile-computing-system.html">
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
listens for voice all the time</a>.</p>
</li>
@@ -444,6 +543,29 @@
</div>
<ul>
+
+ <li><p>The <span class="inserted"><ins><em>Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of data in the phone, and in server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The</em></ins></span> Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how “getting the user's
consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
<li><p>Apps that include
<a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
@@ -452,9 +574,9 @@
</li>
<li><p>Facebook's new Magic Photo app
- <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">scans</strong></del></span>
-<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans</em></ins></span> your mobile phone's photo collections for known
faces</a>,
+ <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
and suggests you to share the picture you take according to who
is in the frame.</p>
@@ -475,8 +597,7 @@
are starting to realize that it is nasty.</p>
<p>This article shows the <a
-<span
class="removed"><del><strong>href="http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></strong></del></span>
-<span
class="inserted"><ins><em>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></em></ins></span>
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as a way
to “serve” users better</a>—never mind
whether they want that. This is a typical example of
@@ -527,6 +648,11 @@
</div>
<ul>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
+ </li>
+
<li><p>Angry Birds
<a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and the NSA takes advantage to spy through it
too</a>.
@@ -545,8 +671,58 @@
</div>
<ul>
+
+ <span class="removed"><del><strong><li><p>A company that makes
internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots of personal information about how
+ people use it</a>.</p>
+
+ <p>The company's statement that it anonymizes the data may be
+ true, but it doesn't really matter. If it sells the data to a
+ data broker, the data broker can figure out who the user is.</p>
+ </li>
+
+ <li><p>A</strong></del></span>
+ <span class="inserted"><ins><em><li>
+ <p>A</em></ins></span> computerized vibrator
+ <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</em></ins></span> on its users through the proprietary
control app</a>.</p>
+
+ <p>The app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em>was reporting</em></ins></span> the temperature of
the vibrator minute by
+ minute (thus, indirectly, whether it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> surrounded by a person's
+ body), <span class="removed"><del><strong>and</strong></del></span>
<span class="inserted"><ins><em>as well as</em></ins></span> the vibration
frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users <span
class="removed"><del><strong>can check</strong></del></span> <span
class="inserted"><ins><em>could have
+ checked</em></ins></span> and <span
class="removed"><del><strong>change.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p>
+
+ <p>The company that made the vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a
+ data broker, the data broker would have been able to figure out
+ who the user was.</p>
+
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a>
+ to its customers.</p></em></ins></span>
+ </li>
+
+ <span class="inserted"><ins><em><li><p> “CloudPets”
toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li></em></ins></span>
+
<li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults.</a>.</p>
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and <span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>adults</a>.</p></em></ins></span>
</li>
</ul>
@@ -587,13 +763,13 @@
<div style="clear: left;"></div>
<ul>
- <span class="inserted"><ins><em><li><p>Investigation
+ <li><p>Investigation
Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
<p>Specifically, it can collect the emails of members of Parliament
- this way, because they pass it through
Microsoft.</p></li></em></ins></span>
+ this way, because they pass it through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
@@ -673,7 +849,12 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
access its computers remotely and make changes in various
@@ -690,7 +871,7 @@
modem enables the phone company to track the car's movements all
the time; it is possible to physically remove the cell phone modem
though.</p>
- </li></em></ins></span>
+ </li>
<li><p>Proprietary software in cars
<a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
@@ -723,6 +904,11 @@
<div style="clear: left;"></div>
<ul>
+ <span class="inserted"><ins><em><li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p>
+ </li></em></ins></span>
+
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed to spy on their
renters</a>.</p>
</li>
@@ -740,6 +926,32 @@
before Amazon “smart” TVs.</p>
<ul>
+ <span class="inserted"><ins><em><li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer, the TV reports what it is. The existence of a way to
+ disable the surveillance, even if it were not hidden as it was in
+ these TVs, does not legitimize the surveillance.</p>
+ </li></em></ins></span>
+
+ <li><p>More or less all “smart” TVs <a <span
class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+<span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</em></ins></span>
+ on their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report what
+ the user watches — no exceptions!</p>
+ </li>
<li><p>Vizio goes a step further than other TV manufacturers in
spying on
their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
@@ -778,6 +990,11 @@
give it to the US or some other government.</p>
<p>Speech recognition is not to be trusted unless it is done
by free software in your own computer.</p>
+
+ <span class="inserted"><ins><em><p>In its privacy policy, Samsung
explicitly confirms
+ that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to
+ third parties</a>.</p></em></ins></span>
</li>
<li><p>Spyware in
<a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
@@ -852,6 +1069,19 @@
<ul>
+ <span class="inserted"><ins><em><li><p>When a page uses Disqus
for
+ comments, <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
+ proprietary Disqus software loads a Facebook software package into
+ the browser of every anonymous visitor to the page, and makes the
+ page's URL available to Facebook</a>.
+ </p></li></em></ins></span>
+
+ <li><p>Online sales, with tracking and surveillance of
customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
+ businesses to show different people different prices</a>. Most
+ of the tracking is done by recording interactions with
+ servers, but proprietary software contributes.</p>
+ </li>
+
<li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
</li>
@@ -863,10 +1093,9 @@
</li>
<li><p>Many web sites rat their visitors to advertising networks
that track
- users. Of the top 1000 web sites, <a <span
class="removed"><del><strong>href="https://www.law.berkeley.edu/index.htmlcenters/berkeley-center-for-law-technology/research/privacy-at-bclt/web-privacy-census/">
- 93%</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
- (as of 5/17/2012)</em></ins></span> fed their visitors third-party
cookies, allowing other
+ users. Of the top 1000 web sites, <a
+
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing other
sites to track them</a>.</p>
</li>
@@ -893,8 +1122,8 @@
</div>
<ul>
- <li><p>Google Chrome makes it easy for an extension to do <a
<span
class="removed"><del><strong>href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy">total</strong></del></span>
- <span
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total</em></ins></span>
+ <li><p>Google Chrome makes it easy for an extension to do <a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping on the user's browsing</a>, and many of them do
so.</p>
</li>
</ul>
@@ -941,6 +1170,28 @@
</li>
</ul>
+<!-- #SpywareInVR -->
+<div class="big-section">
+ <h3 id="SpywareInVR">Spyware In VR</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>VR equipment, measuring every slight motion, creates the
+ potential for the most intimate surveillance ever. All it takes
+ to make this potential
+ real <a
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many other programs listed in this
+ page</a>.</p>
+
+ <p>You can bet Facebook will implement the maximum possible
+ surveillance on Oculus Rift devices. The moral is, never trust a
+ VR system with nonfree software in it.</p>
+ </li>
+</ul>
+
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -988,7 +1239,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -998,7 +1249,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/06/30 15:59:44 $
+$Date: 2017/03/26 02:59:38 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary proprietary-surveillance.ja.htm...,
GNUN <=