www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-surveillance.it.htm...


From: GNUN
Subject: www/proprietary proprietary-surveillance.it.htm...
Date: Wed, 9 Aug 2017 19:29:15 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/08/09 19:29:15

Modified files:
        proprietary    : proprietary-surveillance.it.html 
        proprietary/po : proprietary-surveillance.it-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.19&r2=1.20

Patches:
Index: proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-surveillance.it.html    2 Jun 2017 15:29:08 -0000       1.36
+++ proprietary-surveillance.it.html    9 Aug 2017 23:29:15 -0000       1.37
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-surveillance.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-surveillance.it.po">
+ https://www.gnu.org/proprietary/po/proprietary-surveillance.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-surveillance.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-surveillance.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-06-10" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-surveillance.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.79 -->
@@ -30,6 +35,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Sorveglianza proprietaria</h2>
 
 <p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
@@ -1425,7 +1431,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/06/02 15:29:08 $
+$Date: 2017/08/09 23:29:15 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-surveillance.it-diff.html    27 Mar 2017 15:29:42 -0000      
1.19
+++ po/proprietary-surveillance.it-diff.html    9 Aug 2017 23:29:15 -0000       
1.20
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.83</em></ins></span> --&gt;
 &lt;title&gt;Proprietary Surveillance - GNU Project - Free Software 
Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
 .announcement { 
@@ -79,14 +79,15 @@
     &lt;li&gt;&lt;a href="#SpywareIniThings"&gt;Spyware in 
iThings&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a href="#SpywareInTelephones"&gt;Spyware in 
Telephones&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a href="#SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareInGames"&gt;Spyware in 
Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareInToys"&gt;Spyware in 
Toys&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;Spyware in 
Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a</strong></del></span> href="#SpywareInToys"&gt;Spyware in 
Toys&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
     &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/a&gt;
+    &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#SpywareOnSmartWatches"&gt;Spyware on Smart 
Watches&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a</em></ins></span> href="#SpywareAtLowLevel"&gt;Spyware at 
Low Level&lt;/a&gt;
       &lt;ul&gt;
     &lt;li&gt;&lt;a href="#SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/a&gt;&lt;/li&gt;
-    &lt;!-- &lt;li&gt;&lt;a href="#SpywareInFirmware"&gt;Spyware in 
Firmware&lt;/a&gt;&lt;/li&gt; --&gt;
+    <span class="removed"><del><strong>&lt;!-- &lt;li&gt;&lt;a 
href="#SpywareInFirmware"&gt;Spyware in Firmware&lt;/a&gt;&lt;/li&gt; 
--&gt;</strong></del></span>
       &lt;/ul&gt;
     &lt;/li&gt;
     &lt;li&gt;&lt;a href="#SpywareAtWork"&gt;Spyware at Work&lt;/a&gt;
@@ -106,15 +107,17 @@
     &lt;li&gt;&lt;a href="#SpywareInTVSets"&gt;Spyware in TV 
Sets&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
     &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareAtPlay"&gt;Spyware at 
Play&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;Spyware at 
Play&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;Spyware in 
Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="#SpywareInRecreation"&gt;Spyware in 
Recreation&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a href="#SpywareOnTheWeb"&gt;Spyware on the Web&lt;/a&gt;
       &lt;ul&gt;
         &lt;li&gt;&lt;a href="#SpywareInChrome"&gt;Spyware in 
Chrome&lt;/a&gt;&lt;/li&gt;
         &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Spyware in 
Flash&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
     &lt;/li&gt;
-    &lt;li&gt;&lt;a href="#SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/a&gt;&lt;/li&gt; 
-    <span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#SpywareInVR"&gt;Spyware In VR&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;Spyware in 
Drones&lt;/a&gt;&lt;/li&gt; 
+    &lt;li&gt;&lt;a</em></ins></span> href="#SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/a&gt;&lt;/li&gt; 
+    &lt;li&gt;&lt;a href="#SpywareInVR"&gt;Spyware In VR&lt;/a&gt;&lt;/li&gt;
   &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -142,7 +145,7 @@
 keyboard, in the mobile computing industry, in the office, at home, in
 transportation systems, and in the classroom.&lt;/p&gt;
 
-&lt;h3 id="AggregateInfoCollection"&gt;Aggregate Information 
Collection&lt;/h3&gt;
+&lt;h3 id="AggregateInfoCollection"&gt;Aggregate <span 
class="removed"><del><strong>Information 
Collection&lt;/h3&gt;</strong></del></span> <span class="inserted"><ins><em>or 
anonymized data&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;Many companies, in their privacy policy, have a clause that claims
 they share aggregate, non-personally identifiable information with
@@ -160,7 +163,7 @@
         subpoena.&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;p&gt;Therefore, we must never pay any attention to what companies say
+&lt;p&gt;Therefore, we must <span class="removed"><del><strong>never pay any 
attention to what companies say</strong></del></span> <span 
class="inserted"><ins><em>not be distracted by companies' statements 
of</em></ins></span>
 they will &lt;em&gt;do&lt;/em&gt; with the data they collect. The wrong is that
 they collect it at all.&lt;/p&gt;
 
@@ -184,17 +187,17 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Windows DRM
+  &lt;li&gt;&lt;p&gt;Windows DRM
   files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
   be used to identify people browsing through Tor&lt;/a&gt;. The
   vulnerability exists only if you use Windows.
-  &lt;/p&gt;&lt;/li&gt;</em></ins></span>
+  &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;By default, Windows 10 &lt;a 
href="http://betanews.com/2016/11/24/microsoft-shares-windows-10-telemetry-data-with-third-parties"&gt;sends
       debugging information to Microsoft, including core dumps&lt;/a&gt;. 
Microsoft now distributes them to another company.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 
 &lt;li&gt;In order to increase Windows 10's install base, Microsoft
 &lt;a
@@ -217,10 +220,8 @@
       applications.  Then another downgrade inserted a general spying
       program.  Users noticed this and complained, so Microsoft
       renamed it
-      &lt;a
-href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
-to give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
-
+      &lt;a 
href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/"&gt;
+       to give users the impression it was gone&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;To use proprietary software is to invite such 
treatment.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;
@@ -334,6 +335,118 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+&lt;li&gt;
+  <span class="inserted"><ins><em>&lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the privacy and security
+    of 283 Android VPN apps concluded that &ldquo;in spite of the
+    promises for privacy, security, and anonymity given by the
+    majority of VPN apps&mdash;millions of users may be unawarely subject
+    to poor security guarantees and abusive practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
+    the research paper that tracks and infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to
+      users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
+      and may turn them over to the UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display
+      ads. Uses roughly 5 tracking libraries. Also, it redirects the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that the non-premium version of the app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+&lt;li&gt;</em></ins></span>
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps for BART
+    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
+       data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;
+
+  &lt;/li&gt;
+  
   &lt;li&gt;&lt;p&gt;More than 73% of the most popular Android apps
   &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
   behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
@@ -391,11 +504,11 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Apple proposes
+  &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
       &mdash; which would mean no way to use it without having your 
fingerprints
       taken. Users would have no way to tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+      them.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
       lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
@@ -413,7 +526,7 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
-      &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span> 
+      &lt;a class="not-a-duplicate" 
         href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
        behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
@@ -445,7 +558,7 @@
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
+      the &lt;a class="not-a-duplicate"
             
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
        iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
       and get other info too.&lt;/p&gt;
@@ -489,6 +602,9 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+
   &lt;li&gt;&lt;p&gt;According to Edward Snowden,
       &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
       by sending hidden text messages which enable them to turn the phones
@@ -543,8 +659,35 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;Facebook's app listens all the 
time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening to or watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
+       &lt;/li&gt;
+
+  &lt;li&gt;</em></ins></span>
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal data in the 
device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the
+    user must explicitly opt-in before the app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The <span class="inserted"><ins><em>Meitu photo-editing
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
   app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
   user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
@@ -554,7 +697,7 @@
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The</em></ins></span> Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
         movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
         &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
@@ -641,15 +784,16 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInGames"&gt;Spyware</strong></del></span>
 <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Spyware</em></ins></span> in 
<span class="removed"><del><strong>Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>then sends personal data about them to
       nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -671,38 +815,30 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span class="inserted"><ins><em>i-Que 
transmit</em></ins></span> 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
-   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A company that makes 
internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots of personal information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>company's statement that 
it anonymizes the data may be
-        true, but it doesn't really matter. If it sells the 
data</strong></del></span> <span class="inserted"><ins><em>&ldquo;smart&rdquo; 
toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;,</em></ins></span>
-      a
-        <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>speech recognition company based 
in</em></ins></span> the <span class="removed"><del><strong>data 
broker</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-      can <span class="removed"><del><strong>figure out 
who</strong></del></span> <span class="inserted"><ins><em>remotely 
control</em></ins></span> the <span class="removed"><del><strong>user 
is.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>toys with a 
mobile phone. This would
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
       enable crackers to listen in on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;</em></ins></span>
+      into the toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;A</em></ins></span> computerized vibrator
-      &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</em></ins></span> on its users through the proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>was reporting</em></ins></span> the temperature of 
the vibrator minute by
-      minute (thus, indirectly, whether it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> surrounded by a person's
-      body), <span class="removed"><del><strong>and</strong></del></span> 
<span class="inserted"><ins><em>as well as</em></ins></span> the vibration 
frequency.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
     
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
       standard with which manufacturers would make statements about
-      their products, rather than free software which users <span 
class="removed"><del><strong>can check</strong></del></span> <span 
class="inserted"><ins><em>could have
-      checked</em></ins></span> and <span 
class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
     
     &lt;p&gt;The company that made the vibrator
       &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
@@ -717,25 +853,52 @@
     &lt;p&gt;Following this lawsuit,
       &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
        the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</em></ins></span>
+      to its customers.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; 
toys with microphones
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
        manufacturer&lt;/a&gt;. Guess what?
       &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
       collected by the manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- <span class="inserted"><ins><em>#SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on &ldquo;Smart&rdquo; 
Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed
+      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else and to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app
+      &lt;a 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could be a
+      misunderstanding.  However, it is certainly surveillance, at
+      least.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!--</em></ins></span> #SpywareAtLowLevel --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
@@ -833,7 +996,7 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+  &lt;li&gt;&lt;p&gt;E-books can contain <span 
class="removed"><del><strong>Javascript</strong></del></span> <span 
class="inserted"><ins><em>JavaScript</em></ins></span> code,
     and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
     this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -858,11 +1021,11 @@
 
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;</em></ins></span>
   snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
+  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf has a built-in cell 
phone modem which allows
   effectively
   anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
   access its computers remotely and make changes in various
@@ -881,7 +1044,7 @@
     though.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
+  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary software in cars
       &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
       which is made available to car manufacturers, insurance companies, and
       others.&lt;/p&gt;
@@ -912,10 +1075,20 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Nest thermometers
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Lots of 
&ldquo;smart&rdquo; products are
+        designed &lt;a 
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of
+    making a device that can obey your voice commands without
+    potentially spying on you.  Even if it is air-gapped, it could be
+    saving up records about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;&lt;p&gt;Nest thermometers
   send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
   lot of data about the user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
       Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
@@ -934,7 +1107,7 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;Vizio
     &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts
@@ -958,7 +1131,7 @@
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what
       the user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
       their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
       &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
@@ -989,7 +1162,8 @@
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
       &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all the time&lt;/a&gt;.&lt;/p&gt;
+      <span class="removed"><del><strong>watching and 
listening</strong></del></span>
+      <span class="inserted"><ins><em>snooping</em></ins></span> all the 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
       &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet to another
@@ -998,10 +1172,10 @@
       &lt;p&gt;Speech recognition is not to be trusted unless it is done
     by free software in your own computer.&lt;/p&gt;
 
-      <span class="inserted"><ins><em>&lt;p&gt;In its privacy policy, Samsung 
explicitly confirms
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
       that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
       data containing sensitive information will be transmitted to
-      third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Spyware in
       &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
@@ -1025,14 +1199,40 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- #SpywareAtPlay --&gt;
+&lt;!-- <span 
class="removed"><del><strong>#SpywareAtPlay</strong></del></span> <span 
class="inserted"><ins><em>#SpywareInGames</em></ins></span> --&gt;
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose 
for</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically, the app would record the names of the audio 
files</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</em></ins></span>
+      users <span class="removed"><del><strong>listen</strong></del></span> 
<span class="inserted"><ins><em>identify themselves and then sends personal 
data about them</em></ins></span> to <span class="removed"><del><strong>along 
with the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses that this was done without the users' consent.
+If the fine print of the app said that users gave consent</strong></del></span>
+      <span class="inserted"><ins><em>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</em></ins></span> for <span class="removed"><del><strong>this,
+would that make</strong></del></span> <span 
class="inserted"><ins><em>companies, and the NSA takes advantage to spy 
through</em></ins></span> it <span class="removed"><del><strong>acceptable? No 
way! It should be flat out</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.
+      Here's information on</em></ins></span>
+      &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal to design the</strong></del></span> <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA</em></ins></span> app <span 
class="removed"><del><strong>to snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
   &lt;li&gt;&lt;p&gt;Many 
       &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
       video game consoles snoop on their users and report to the 
@@ -1060,7 +1260,31 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!-- #SpywareOnTheWeb --&gt;
+&lt;!-- <span class="inserted"><ins><em>#SpywareAtRecreation --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtRecreation"&gt;Spyware at Recreation&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareAtRecreation"&gt;#SpywareAtRecreation&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Users are suing Bose for
+      &lt;a 
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+       distributing a spyware app for its headphones&lt;/a&gt;.
+      Specifically, the app would record the names of the audio files
+      users listen to along with the headphone's unique serial number.
+    &lt;/p&gt;
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+      If the fine print of the app said that users gave consent for this,
+      would that make it acceptable? No way! It should be flat out
+      &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+       illegal to design the app to snoop at all&lt;/a&gt;.
+    &lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!--</em></ins></span> #SpywareOnTheWeb --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheWeb"&gt;Spyware on the Web&lt;/h3&gt;
@@ -1075,8 +1299,13 @@
    but the surveillance is an abuse all the same.&lt;/p&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Many web sites use 
JavaScript
+        code &lt;a 
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;to
+        snoop on information that users have typed into a form but not
+        sent&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;When a page uses Disqus 
for
+  &lt;li&gt;&lt;p&gt;When a page uses Disqus for
   comments, &lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
   proprietary Disqus software loads a Facebook software package into
   the browser of every anonymous visitor to the page, and makes the
@@ -1087,7 +1316,7 @@
       businesses to show different people different prices&lt;/a&gt;. Most
       of the tracking is done by recording interactions with
       servers, but proprietary software contributes.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
       Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
@@ -1129,6 +1358,22 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google Chrome
+      <span class="inserted"><ins><em>&lt;a 
href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+       spies on browser history, affiliations&lt;/a&gt;,
+      and other installed software.
+    &lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Google Chrome</em></ins></span> contains a key logger that
+      &lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that
+      &lt;a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
   &lt;li&gt;&lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
     snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
@@ -1153,11 +1398,26 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;p&gt;&lt;a href="/philosophy/javascript-trap.html"&gt;Javascript 
code&lt;/a&gt;
+&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/javascript-trap.html"&gt;Javascript</strong></del></span>
 <span 
class="inserted"><ins><em>href="/philosophy/javascript-trap.html"&gt;JavaScript</em></ins></span>
 code&lt;/a&gt;
 is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
 
 
-&lt;!-- #SpywareEverywhere --&gt;
+&lt;!-- <span class="inserted"><ins><em>#SpywareInDrones --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInDrones"&gt;Spyware in Drones&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;While you're using a DJI drone to snoop on other people, DJI is 
in many
+      cases &lt;a 
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
 on you&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!--</em></ins></span> #SpywareEverywhere --&gt;
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareEverywhere"&gt;Spyware Everywhere&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;
@@ -1177,7 +1437,7 @@
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;!-- #SpywareInVR --&gt;
+&lt;!-- #SpywareInVR --&gt;
 &lt;div class="big-section"&gt;
     &lt;h3 id="SpywareInVR"&gt;Spyware In VR&lt;/h3&gt;
     &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
@@ -1196,7 +1456,7 @@
       surveillance on Oculus Rift devices. The moral is, never trust a
       VR system with nonfree software in it.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
@@ -1246,7 +1506,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2016</strong></del></span> <span 
class="inserted"><ins><em>2016, 2017</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -1256,7 +1516,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/03/27 15:29:42 $
+$Date: 2017/08/09 23:29:15 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]