[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/basic-freedoms.html philosophy/s...
From: |
Therese Godefroy |
Subject: |
www philosophy/basic-freedoms.html philosophy/s... |
Date: |
Tue, 5 Jun 2018 11:33:15 -0400 (EDT) |
CVSROOT: /webcvs/www
Module name: www
Changes by: Therese Godefroy <th_g> 18/06/05 11:33:14
Modified files:
philosophy : basic-freedoms.html
surveillance-vs-democracy.html
who-does-that-server-really-serve.html
words-to-avoid.html
proprietary : malware-apple.html malware-appliances.html
malware-games.html malware-microsoft.html
malware-mobiles.html
proprietary-insecurity.html
proprietary-sabotage.html
proprietary-surveillance.html
Log message:
Fix dead links and forward loops (linc report June 2).
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/basic-freedoms.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.html?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.html?cvsroot=www&r1=1.184&r2=1.185
Patches:
Index: philosophy/basic-freedoms.html
===================================================================
RCS file: /webcvs/www/www/philosophy/basic-freedoms.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- philosophy/basic-freedoms.html 18 Nov 2016 06:31:39 -0000 1.43
+++ philosophy/basic-freedoms.html 5 Jun 2018 15:33:14 -0000 1.44
@@ -34,7 +34,7 @@
</li>
<li>
- <a href="http://www.factnet.org/">F.A.C.T.Net Inc.</a>
+ <a href="http://www.factnetglobal.org/">F.A.C.T.Net Inc.</a>
is a non-profit Internet digest, news service, library, dialogue
center, and archive dedicated to the promotion and defense of
international free thought, free speech, and privacy rights.
@@ -104,7 +104,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/11/18 06:31:39 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/surveillance-vs-democracy.html
===================================================================
RCS file: /webcvs/www/www/philosophy/surveillance-vs-democracy.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- philosophy/surveillance-vs-democracy.html 5 Apr 2018 09:30:35 -0000
1.61
+++ philosophy/surveillance-vs-democracy.html 5 Jun 2018 15:33:14 -0000
1.62
@@ -299,8 +299,8 @@
<p>Nowadays, security cameras have become surveillance cameras: they
are connected to the Internet so recordings can be collected in a data
center and saved forever. In Detroit, the cops pressure businesses to
-give
-them <a
href="http://www.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited
+give them <a
+href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/">unlimited
access to their surveillance cameras</a> so that they can look through
them at any and all times. This is already dangerous, but it is going
to get worse. Advances in face recognition may bring the day when
@@ -308,8 +308,8 @@
who they talk with.</p>
<p>Internet-connected cameras often have lousy digital security
-themselves, which
-means <a
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">anyone
+themselves, which means <a
+href="https://www.csoonline.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html">anyone
can watch what those cameras see</a>. This makes internet-connected
cameras a major threat to security as well as privacy. For privacy's
sake, we should ban the use of Internet-connected cameras aimed where
@@ -507,7 +507,7 @@
police have their own jargon term for perjury,
“<a
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
since they do it so frequently, particularly about protesters
-and <a href="http://photographyisnotacrime.com/">photographers</a>.)
+and <a href="https://www.themaven.net/pinacnews/">photographers</a>.)
One city in California that required police to wear video cameras all
the time
found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
@@ -609,7 +609,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/04/05 09:30:35 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/who-does-that-server-really-serve.html
===================================================================
RCS file: /webcvs/www/www/philosophy/who-does-that-server-really-serve.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- philosophy/who-does-that-server-really-serve.html 31 Mar 2018 01:56:21
-0000 1.65
+++ philosophy/who-does-that-server-really-serve.html 5 Jun 2018 15:33:14
-0000 1.66
@@ -200,7 +200,7 @@
“open” and “free”. Source code that is open
source <a href="/philosophy/free-open-overlap.html">is, nearly always,
free</a>. However, the idea of
-an <a href="http://opendefinition.org/software-service">“open
+an <a href="https://opendefinition.org/ossd/">“open
software” service</a>, meaning one whose server software is open
source and/or free, fails to address the issue of SaaSS.</p>
@@ -464,7 +464,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/03/31 01:56:21 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/words-to-avoid.html
===================================================================
RCS file: /webcvs/www/www/philosophy/words-to-avoid.html,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- philosophy/words-to-avoid.html 21 Apr 2018 19:25:58 -0000 1.248
+++ philosophy/words-to-avoid.html 5 Jun 2018 15:33:14 -0000 1.249
@@ -292,7 +292,7 @@
</p>
<p>
-The <a href="http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf">
+The <a href="https://csrc.nist.gov/publications/detail/sp/800-145/final">
NIST definition of "cloud computing"</a> mentions three scenarios that
raise different ethical issues: Software as a Service, Platform as a
Service, and Infrastructure as a Service. However, that definition
@@ -1349,7 +1349,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/04/21 19:25:58 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-apple.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-apple.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/malware-apple.html 3 May 2018 19:45:57 -0000 1.69
+++ proprietary/malware-apple.html 5 Jun 2018 15:33:14 -0000 1.70
@@ -150,7 +150,7 @@
<li>
<p>The iPhone 7 contains DRM specifically designed to <a
-
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
@@ -206,7 +206,7 @@
taken. Users would have no way to tell whether the phone is snooping on
them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
lots of personal data to Apple's servers</a>. Big Brother can
get them from there.</p>
</li>
@@ -359,7 +359,7 @@
</li>
<li><p><a
-
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">
+
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
Apple uses DRM software to prevent people from charging an iThing with a
generic USB cable</a>.</p></li>
@@ -585,7 +585,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/05/03 19:45:57 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-appliances.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-appliances.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/malware-appliances.html 4 Mar 2018 13:14:15 -0000 1.42
+++ proprietary/malware-appliances.html 5 Jun 2018 15:33:14 -0000 1.43
@@ -108,9 +108,9 @@
</li>
<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to the Internet,
-its security is crap</a>.</p>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher is <a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+connected to the Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's filesystem,
infect it with malware, and force the dishwasher to launch attacks on
other devices in the network. Since these dishwashers are used in hospitals,
@@ -309,7 +309,7 @@
<li>
<p> “Self-encrypting” disk drives do the encryption with
proprietary firmware so you can't trust it. Western Digital's <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
“My Passport” drives have a back door</a>.</p>
</li>
@@ -549,7 +549,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/03/04 13:14:15 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-games.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-games.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/malware-games.html 1 Jan 2018 06:22:13 -0000 1.9
+++ proprietary/malware-games.html 5 Jun 2018 15:33:14 -0000 1.10
@@ -60,8 +60,8 @@
</li>
<li>
-<p>Oculus Rift games now have
-<a href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform">
+<p>Oculus Rift games now have <a
+href="https://motherboard.vice.com/en_us/article/vv77ea/new-oculus-drm-cross-platform">
DRM meant to prevent running them on other systems</a>.</p>
</li>
@@ -140,7 +140,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/01 06:22:13 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-microsoft.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-microsoft.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/malware-microsoft.html 3 May 2018 18:54:24 -0000 1.73
+++ proprietary/malware-microsoft.html 5 Jun 2018 15:33:14 -0000 1.74
@@ -150,7 +150,7 @@
<li>
<p>Microsoft has made Windows 7 and 8 cease to function on certain
new computers,
- <a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
+ <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
@@ -288,7 +288,7 @@
by force setting the telemetry mode to “Full”</a>.</p>
<p>The <a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">
+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
engineers to access, among other things, registry keys
<a href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
@@ -348,7 +348,7 @@
<li>Spyware in Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user.</a>
- <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ <a
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches.</a> And there's a
<a href="http://www.marketoracle.co.uk/Article40836.html">
secret NSA key in Windows</a>, whose functions we don't know.</li>
@@ -505,7 +505,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/05/03 18:54:24 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/malware-mobiles.html
===================================================================
RCS file: /webcvs/www/www/proprietary/malware-mobiles.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/malware-mobiles.html 25 Jan 2018 19:08:16 -0000 1.55
+++ proprietary/malware-mobiles.html 5 Jun 2018 15:33:14 -0000 1.56
@@ -441,7 +441,7 @@
<li>
<p>The iPhone 7 contains DRM specifically designed to <a
-
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
@@ -530,7 +530,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/25 19:08:16 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/proprietary-insecurity.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary/proprietary-insecurity.html 3 May 2018 14:59:04 -0000
1.78
+++ proprietary/proprietary-insecurity.html 5 Jun 2018 15:33:14 -0000
1.79
@@ -156,9 +156,9 @@
</li>
<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to the Internet,
-its security is crap</a>.</p>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher is <a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+connected to the Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's filesystem,
infect it with malware, and force the dishwasher to launch attacks on other
@@ -223,8 +223,9 @@
</li>
<li>
-<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
-been developed for a thermostat that uses proprietary software</a>.</p>
+<p>Ransomware <a
+href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
+has been developed for a thermostat that uses proprietary software</a>.</p>
</li>
<li>
@@ -452,7 +453,8 @@
It is possible to kill people by taking control of medical implants by
radio</a>. Here
is <a href="http://www.bbc.co.uk/news/technology-17631838">more
-information</a>. And <a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
+information</a>. And <a
+href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
</p>
</li>
@@ -570,7 +572,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/05/03 14:59:04 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/proprietary-sabotage.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-sabotage.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/proprietary-sabotage.html 2 Feb 2018 16:25:50 -0000
1.53
+++ proprietary/proprietary-sabotage.html 5 Jun 2018 15:33:14 -0000
1.54
@@ -86,7 +86,7 @@
<li>
<p>The iPhone 7 contains DRM specifically designed to <a
-
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides Apple.</p>
@@ -99,7 +99,7 @@
<li>
<p>Microsoft has made Windows 7 and 8 cease to
function on certain new computers,
- <a
href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
+ <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
@@ -385,7 +385,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/02/02 16:25:50 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/proprietary-surveillance.html
===================================================================
RCS file: /webcvs/www/www/proprietary/proprietary-surveillance.html,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary/proprietary-surveillance.html 19 May 2018 02:47:50 -0000
1.184
+++ proprietary/proprietary-surveillance.html 5 Jun 2018 15:33:14 -0000
1.185
@@ -182,7 +182,7 @@
by force setting the telemetry mode to “Full”</a>.</p>
<p>The <a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">
+href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
engineers to access, among other things, registry keys
<a href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
@@ -581,7 +581,7 @@
taken. Users would have no way to tell whether the phone is snooping on
them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
lots of personal data to Apple's servers</a>. Big Brother can
get them from there.</p>
</li>
@@ -591,7 +591,9 @@
days.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ <li><p>Users cannot make an Apple ID <a
+href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
+ (necessary to install even gratis apps)</a>
without giving a valid email address and receiving the code Apple
sends to it.</p>
</li>
@@ -952,11 +954,12 @@
to its customers.</p>
</li>
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
- collected by the manufacturer's snooping.</p>
+ <li><p> “CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these conversations
was unacceptable by itself.</p></li>
@@ -1447,8 +1450,8 @@
Baidu's Japanese-input and Chinese-input apps spy on users.</a></p>
</li>
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ <li><p>Pages that contain “Like” buttons <a
+
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
enable Facebook to track visitors to those pages</a>—even
users that don't have Facebook accounts.</p>
</li>
@@ -1661,7 +1664,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/05/19 02:47:50 $
+$Date: 2018/06/05 15:33:14 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www philosophy/basic-freedoms.html philosophy/s...,
Therese Godefroy <=