www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-surveillance.ja.htm...


From: GNUN
Subject: www/proprietary proprietary-surveillance.ja.htm...
Date: Sat, 25 Mar 2017 22:59:38 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/03/25 22:59:38

Modified files:
        proprietary    : proprietary-surveillance.ja.html 
        proprietary/po : proprietary-surveillance.ja-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ja.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.1&r2=1.2

Patches:
Index: proprietary-surveillance.ja.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ja.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-surveillance.ja.html    24 Jan 2017 03:40:30 -0000      1.29
+++ proprietary-surveillance.ja.html    26 Mar 2017 02:59:37 -0000      1.30
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-surveillance.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-surveillance.ja.po">
+ https://www.gnu.org/proprietary/po/proprietary-surveillance.ja.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-surveillance.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-surveillance.ja-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-01-25" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-surveillance.en.html" -->
 
 <!--#include virtual="/server/header.ja.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -30,6 +35,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
 <!--#include virtual="/server/banner.ja.html" -->
+<!--#include virtual="/server/outdated.ja.html" -->
 <h2>プロプライエタリな監視</h2>
 
 
<p>不自由な(プロプライエタリな)ソフトウェアは実に多くのå
 ´åˆãƒžãƒ«ã‚¦ã‚§ã‚¢ã§ã™(ユーザを虐待するように設計
@@ -926,7 +932,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最終更新:
 
-$Date: 2017/01/24 03:40:30 $
+$Date: 2017/03/26 02:59:37 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-surveillance.ja-diff.html    30 Jun 2016 15:59:44 -0000      
1.1
+++ po/proprietary-surveillance.ja-diff.html    26 Mar 2017 02:59:38 -0000      
1.2
@@ -11,14 +11,57 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.79</em></ins></span> --&gt;
+&lt;!-- Parent-Version: 1.79 --&gt;
 &lt;title&gt;Proprietary Surveillance - GNU Project - Free Software 
Foundation&lt;/title&gt;
+&lt;style type="text/css" media="print,screen"&gt;&lt;!--
+.announcement { 
+   background: none;
+}
+#surveillance div.toc {
+   width: 24.5em; max-width: 94%;
+   margin-bottom: 1em;
+}
address@hidden (min-width: 48em) {
+   #surveillance div.toc {
+      float: left;
+      width: auto; max-width: 48%;
+      margin: .2em 0 1em;
+   }
+   #surveillance .medium {
+      width: 43%;
+      margin: 7em 0 1em 1.5em;
+   }
+}
+--&gt;&lt;/style&gt;
+&lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;
 &lt;!--#include virtual="/proprietary/po/proprietary-surveillance.translist" 
--&gt;
 &lt;!--#include virtual="/server/banner.html" --&gt;
+
 &lt;h2&gt;Proprietary Surveillance&lt;/h2&gt;
 
-&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary.html"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary.html"&gt;</em></ins></span>
+&lt;p&gt;Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;that is the
+basic injustice&lt;/a&gt;. The developers often exercise that power to the
+detriment of the users they ought to serve.&lt;/p&gt;
+
+&lt;div  class="announcement"&gt;
+&lt;p&gt;This document attempts to
+track &lt;strong&gt;clearly established cases of proprietary software that
+spies on or tracks users&lt;/strong&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;
    Other examples of proprietary malware&lt;/a&gt;&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;div id="surveillance"&gt;
+
+&lt;div class="pict medium"&gt;
+&lt;a href="/graphics/dog.html"&gt;
+&lt;img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /&gt;&lt;/a&gt;
+&lt;p&gt;&ldquo;How did they find out I'm a dog?&rdquo;&lt;/p&gt;
+&lt;/div&gt;
 
 &lt;div class="toc"&gt;
   &lt;h3 id="TableOfContents"&gt;Table of Contents&lt;/h3&gt;
@@ -71,8 +114,12 @@
       &lt;/ul&gt;
     &lt;/li&gt;
     &lt;li&gt;&lt;a href="#SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/a&gt;&lt;/li&gt; 
+    &lt;li&gt;&lt;a href="#SpywareInVR"&gt;Spyware In VR&lt;/a&gt;&lt;/li&gt;
   &lt;/ul&gt;
-&lt;/div&gt;&lt;!-- /class="toc" --&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;!-- #Introduction --&gt;
 
@@ -83,11 +130,11 @@
 
 &lt;p&gt;For decades, the Free Software movement has been denouncing the
 abusive surveillance machine of
-&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary.html"&gt;proprietary</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary.html"&gt;proprietary</em></ins></span>
 software&lt;/a&gt;
+&lt;a href="/proprietary/proprietary.html"&gt;proprietary software&lt;/a&gt;
 companies such as
-&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;</em></ins></span>
+&lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;
 and
-&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;.</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;.</em></ins></span>
+&lt;a href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;.
 
 In the recent years, this tendency to watch people has spread across
 industries, not only in the software business, but also in the
@@ -95,10 +142,27 @@
 keyboard, in the mobile computing industry, in the office, at home, in
 transportation systems, and in the classroom.&lt;/p&gt;
 
-&lt;p class="highlight-para"&gt;This document attempts to
-track &lt;strong&gt;clearly established cases of proprietary software that
-spies on or track users&lt;/strong&gt;.&lt;/p&gt;
+&lt;h3 id="AggregateInfoCollection"&gt;Aggregate Information 
Collection&lt;/h3&gt;
 
+&lt;p&gt;Many companies, in their privacy policy, have a clause that claims
+they share aggregate, non-personally identifiable information with
+third parties/partners. Such claims are worthless, for several
+reasons:&lt;/p&gt;
+
+&lt;ul&gt;
+    &lt;li&gt;They could change the policy at any time.&lt;/li&gt;
+    &lt;li&gt;They can twist the words by distributing an 
&ldquo;aggregate&rdquo; of
+        &ldquo;anonymized&rdquo; data which can be reidentified and attributed 
to
+        individuals.&lt;/li&gt;
+    &lt;li&gt;The raw data they don't normally distribute can be taken by
+        data breaches.&lt;/li&gt;
+    &lt;li&gt;The raw data they don't normally distribute can be taken by
+        subpoena.&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;Therefore, we must never pay any attention to what companies say
+they will &lt;em&gt;do&lt;/em&gt; with the data they collect. The wrong is that
+they collect it at all.&lt;/p&gt;
 
 &lt;h3 id="LatestAdditions"&gt;Latest additions&lt;/h3&gt;
 
@@ -120,6 +184,24 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows DRM
+  files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
+  be used to identify people browsing through Tor&lt;/a&gt;. The
+  vulnerability exists only if you use Windows.
+  &lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;By default, Windows 10 &lt;a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
+      debugging information to Microsoft, including core dumps&lt;/a&gt;. 
Microsoft now distributes them to another company.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;In order to increase Windows 10's install base, Microsoft
+&lt;a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+blatantly disregards user choice and privacy&lt;/a&gt;.
+&lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
       Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all 
enabled by default,
       and turning them off would be daunting to most 
users.&lt;/p&gt;&lt;/li&gt;
@@ -135,9 +217,9 @@
       applications.  Then another downgrade inserted a general spying
       program.  Users noticed this and complained, so Microsoft
       renamed it
-      &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;to</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
-to</em></ins></span> give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
+      &lt;a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
+to give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
 
       &lt;p&gt;To use proprietary software is to invite such 
treatment.&lt;/p&gt;
   &lt;/li&gt;
@@ -183,7 +265,7 @@
       voice input.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
       Windows 8.1 snoops on local searches.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -194,7 +276,7 @@
 &lt;/ul&gt;
 
 &lt;p&gt;Microsoft's snooping on users did not start with Windows 10.
-   There's a lot more &lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/malware-microsoft.html"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;</em></ins></span>
+   There's a lot more &lt;a href="/proprietary/malware-microsoft.html"&gt;
    Microsoft malware&lt;/a&gt;.&lt;/p&gt;
 
 
@@ -243,7 +325,7 @@
 &lt;/ul&gt;
 
 &lt;p&gt;There's a lot more &lt;a href="#SpywareIniThings"&gt;iThing 
spyware&lt;/a&gt;, and
-&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/malware-apple.html"&gt;Apple</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple</em></ins></span>
 malware&lt;/a&gt;.&lt;/p&gt;
+&lt;a href="/proprietary/malware-apple.html"&gt;Apple 
malware&lt;/a&gt;.&lt;/p&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -286,7 +368,7 @@
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-back-doors.html#samsung"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#samsung"&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
       Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -309,13 +391,30 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether the phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
       without giving a valid email address and receiving the code Apple
       sends to it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+      &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span> 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
   behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -346,10 +445,10 @@
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      the &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
       and get other info too.&lt;/p&gt;
-  <span class="removed"><del><strong>&lt;!-- 
http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html 
--&gt;</strong></del></span>
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which is
@@ -359,8 +458,8 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;</em></ins></span>
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
       tells Apple its geolocation&lt;/a&gt; by default, though that can be
       turned off.&lt;/p&gt;
   &lt;/li&gt;
@@ -407,7 +506,7 @@
       kind.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="https://www.motorola.com/us/X8-Mobile-Computing-System/x8-mobile-computing-system.html"&gt;
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
       listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -444,6 +543,29 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+
+  &lt;li&gt;&lt;p&gt;The <span class="inserted"><ins><em>Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts of data in the phone, and in server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The</em></ins></span> Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
+        for surveillance is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;Apps that include 
       &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
       Symphony surveillance software snoop on what radio and TV programs 
@@ -452,9 +574,9 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
-      &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;scans</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans</em></ins></span> your mobile phone's photo collections for known 
faces&lt;/a&gt;,
+      &lt;a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
       and suggests you to share the picture you take according to who
       is in the frame.&lt;/p&gt;
 
@@ -475,8 +597,7 @@
       are starting to realize that it is nasty.&lt;/p&gt;
 
       &lt;p&gt;This article shows the &lt;a
-<span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;</strong></del></span>
-<span 
class="inserted"><ins><em>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;</em></ins></span>
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
       twisted ways that they present snooping as a way
       to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
       whether they want that. This is a typical example of
@@ -527,6 +648,11 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
       spies for companies, and the NSA takes advantage to spy through it 
too&lt;/a&gt;.
@@ -545,8 +671,58 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+
+   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A company that makes 
internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting lots of personal information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement that it anonymizes the data may be
+        true, but it doesn't really matter. If it sells the data to a
+        data broker, the data broker can figure out who the user is.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;A</em></ins></span> computerized vibrator
+      &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</em></ins></span> on its users through the proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>was reporting</em></ins></span> the temperature of 
the vibrator minute by
+      minute (thus, indirectly, whether it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> surrounded by a person's
+      body), <span class="removed"><del><strong>and</strong></del></span> 
<span class="inserted"><ins><em>as well as</em></ins></span> the vibration 
frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users <span 
class="removed"><del><strong>can check</strong></del></span> <span 
class="inserted"><ins><em>could have
+      checked</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company that made the vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but it doesn't really matter. If it had sold the data to a
+      data broker, the data broker would have been able to figure out
+      who the user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; 
toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+  
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults.&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -587,13 +763,13 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Investigation
+  &lt;li&gt;&lt;p&gt;Investigation
         Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
       &lt;p&gt;Specifically, it can collect the emails of members of Parliament
-  this way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
@@ -673,7 +849,12 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
   effectively
   anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
   access its computers remotely and make changes in various
@@ -690,7 +871,7 @@
     modem enables the phone company to track the car's movements all
     the time; it is possible to physically remove the cell phone modem
     though.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Proprietary software in cars
       &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
@@ -723,6 +904,11 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
       Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -740,6 +926,32 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer, the TV reports what it is. The existence of a way to
+    disable the surveillance, even if it were not hidden as it was in
+    these TVs, does not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a <span 
class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</em></ins></span>
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
       their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
       &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
@@ -778,6 +990,11 @@
       give it to the US or some other government.&lt;/p&gt;
       &lt;p&gt;Speech recognition is not to be trusted unless it is done
     by free software in your own computer.&lt;/p&gt;
+
+      <span class="inserted"><ins><em>&lt;p&gt;In its privacy policy, Samsung 
explicitly confirms
+      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive information will be transmitted to
+      third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Spyware in
       &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
@@ -852,6 +1069,19 @@
 
 &lt;ul&gt;
 
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;When a page uses Disqus 
for
+  comments, &lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
+  proprietary Disqus software loads a Facebook software package into
+  the browser of every anonymous visitor to the page, and makes the
+  page's URL available to Facebook&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;Online sales, with tracking and surveillance of 
customers, &lt;a 
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+      businesses to show different people different prices&lt;/a&gt;. Most
+      of the tracking is done by recording interactions with
+      servers, but proprietary software contributes.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
       Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
@@ -863,10 +1093,9 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Many web sites rat their visitors to advertising networks 
that track
-      users.  Of the top 1000 web sites, &lt;a <span 
class="removed"><del><strong>href="https://www.law.berkeley.edu/index.htmlcenters/berkeley-center-for-law-technology/research/privacy-at-bclt/web-privacy-census/"&gt;
-      93%</strong></del></span>
-      <span 
class="inserted"><ins><em>href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
-      (as of 5/17/2012)</em></ins></span> fed their visitors third-party 
cookies, allowing other
+      users.  Of the top 1000 web sites, &lt;a
+      
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+      (as of 5/17/2012) fed their visitors third-party cookies, allowing other
       sites to track them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -893,8 +1122,8 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a 
<span 
class="removed"><del><strong>href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy"&gt;total</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
     snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -941,6 +1170,28 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
+&lt;!-- #SpywareInVR --&gt;
+&lt;div class="big-section"&gt;
+    &lt;h3 id="SpywareInVR"&gt;Spyware In VR&lt;/h3&gt;
+    &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, creates the
+      potential for the most intimate surveillance ever. All it takes
+      to make this potential
+      real &lt;a 
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+      software as malicious as many other programs listed in this
+      page&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;You can bet Facebook will implement the maximum possible
+      surveillance on Oculus Rift devices. The moral is, never trust a
+      VR system with nonfree software in it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
@@ -988,7 +1239,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016 Free Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -998,7 +1249,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2016/06/30 15:59:44 $
+$Date: 2017/03/26 02:59:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]