www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-surveillance.de.htm...


From: GNUN
Subject: www/proprietary proprietary-surveillance.de.htm...
Date: Tue, 17 Jul 2018 22:59:29 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/07/17 22:59:29

Modified files:
        proprietary    : proprietary-surveillance.de.html 
        proprietary/po : proprietary-surveillance.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.de.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.7&r2=1.8

Patches:
Index: proprietary-surveillance.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.de.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-surveillance.de.html    18 Mar 2018 02:59:37 -0000      1.34
+++ proprietary-surveillance.de.html    18 Jul 2018 02:59:28 -0000      1.35
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-surveillance.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-surveillance.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-surveillance.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/proprietary/proprietary-surveillance.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary-surveillance.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-05-19" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary-surveillance.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -30,6 +35,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Überwachung </h2>
 
 <p>Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm
@@ -2001,7 +2007,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/07/18 02:59:28 $
 
 <!-- timestamp end -->
 </p>

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-surveillance.de-diff.html    18 Jan 2018 08:33:37 -0000      
1.7
+++ po/proprietary-surveillance.de-diff.html    18 Jul 2018 02:59:29 -0000      
1.8
@@ -110,7 +110,7 @@
     &lt;li&gt;&lt;a href="#SpywareOnTheWeb"&gt;Spyware on the Web&lt;/a&gt;
       &lt;ul&gt;
         &lt;li&gt;&lt;a href="#SpywareInChrome"&gt;Spyware in 
Chrome&lt;/a&gt;&lt;/li&gt;
-        &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Spyware in 
Flash&lt;/a&gt;&lt;/li&gt;
+        &lt;li&gt;&lt;a href="#SpywareInFlash"&gt;Spyware in JavaScript and 
Flash&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
     &lt;/li&gt;
     &lt;li&gt;&lt;a href="#SpywareInDrones"&gt;Spyware in 
Drones&lt;/a&gt;&lt;/li&gt; 
@@ -190,17 +190,17 @@
 
     &lt;p&gt;Furthermore, for users who installed the fourth stable build of
       Windows 10, called the &ldquo;Creators Update,&rdquo; Windows maximized 
the
-<span class="removed"><del><strong>surveillance &lt;a</strong></del></span>
-      <span class="inserted"><ins><em>surveillance&lt;a</em></ins></span> 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
-      by force setting the telemetry mode to <span 
class="removed"><del><strong>&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+      surveillance&lt;a 
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
+      by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;The &lt;a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;
+<span 
class="removed"><del><strong>href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"&gt;</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;</em></ins></span>
  &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
  engineers to access, among other things, registry keys
  &lt;a 
href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
  can contain sensitive information like administrator's login
- password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+ password&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Windows DRM
   files &lt;a 
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can
@@ -287,9 +287,9 @@
       secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li&gt;HP's proprietary
+  &lt;li&gt;HP's proprietary
   operating system &lt;a 
href="http://www.bbc.com/news/technology-42309371"&gt;includes
-  a proprietary keyboard driver with a key logger in 
it&lt;/a&gt;.&lt;/li&gt;</em></ins></span>
+  a proprietary keyboard driver with a key logger in it&lt;/a&gt;.&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;p&gt;Microsoft's snooping on users did not start with Windows 10.
@@ -352,7 +352,28 @@
 
 &lt;ul&gt;
 &lt;li&gt;
-  <span class="inserted"><ins><em>&lt;p&gt;20 dishonest Android apps
+  <span class="inserted"><ins><em>&lt;p&gt;More
+    than &lt;a 
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were found to
+    snoop and collect information about its users&lt;/a&gt;.  40% of the
+    apps were found to insecurely snitch on its users.  Furthermore,
+    they could detect only some methods of snooping, in these
+    proprietary apps whose source code they cannot look at.  The other
+    apps might be snooping in other ways.&lt;/p&gt;
+
+  &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users need
+    to get rid of the proprietary software&mdash;both proprietary Android
+    by &lt;a href="https://replicant.us"&gt;switching to Replicant&lt;/a&gt;, 
and
+    the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt;
+    that &lt;a href="https://f-droid.org/wiki/page/Antifeatures"&gt;
+    prominently warns the user if an app contains
+    anti-features&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</em></ins></span>
+  &lt;p&gt;20 dishonest Android apps
       recorded &lt;a 
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
       calls and sent them and text messages and emails to
       snoopers&lt;/a&gt;.&lt;/p&gt;
@@ -384,7 +405,7 @@
     Google to protect us. We must demand release of source code to the
     public, so we can depend on each other.&lt;/p&gt;
 &lt;/li&gt;
-&lt;li&gt;</em></ins></span>
+&lt;li&gt;
   &lt;p&gt;A
     &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
       research paper&lt;/a&gt; that investigated the privacy and security
@@ -553,11 +574,11 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The DMCA and the EU 
Copyright Directive make it &lt;a
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
       illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
       would require circumventing the iOS DRM.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
       obvious way &lt;a
@@ -573,7 +594,7 @@
       taken. Users would have no way to tell whether the phone is snooping on
       them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
       lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
         get them from there.&lt;/p&gt;
   &lt;/li&gt;
@@ -583,7 +604,9 @@
         days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+<span 
class="inserted"><ins><em>href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;
+      (necessary</em></ins></span> to install even gratis apps)&lt;/a&gt;
       without giving a valid email address and receiving the code Apple
       sends to it.&lt;/p&gt;
   &lt;/li&gt;
@@ -665,7 +688,7 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Tracking software in 
popular Android apps is pervasive and
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
       sometimes very clever. Some trackers can &lt;a
 
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
       follow a user's movements around a physical store by noticing WiFi
@@ -675,7 +698,7 @@
   &lt;li&gt;&lt;p&gt;Android tracks location for Google &lt;a
 
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
       even when &ldquo;location services&rdquo; are turned off, even
-      when the phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</em></ins></span>
+      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
       sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
@@ -734,10 +757,43 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;AI-powered driving apps 
can
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;The Spanish football 
streaming app
+      &lt;a 
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+        the user's movements and listens through the
+        microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to
+      save a recording. But I can't be sure from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care much less about sports, you will benefit
+      in many ways. This is one more.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to each other
+    but not to the server's database.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
     &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The Sarahah app 
       &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
@@ -880,11 +936,11 @@
 &lt;ul&gt;
 
   &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;A remote-control sex toy was 
found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
         of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;</em></ins></span>
+  &lt;li&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
       &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
       a speech recognition company based in the U.S.&lt;/p&gt;
@@ -925,11 +981,12 @@
       to its customers.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak</strong></del></span>
+      <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+      leak</em></ins></span> childrens' conversations to the 
manufacturer&lt;/a&gt;. Guess what? &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+      <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+      Crackers</em></ins></span> found a way to access the data&lt;/a&gt; 
collected by the
+      manufacturer's snooping.&lt;/p&gt;
 
     &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
@@ -1156,6 +1213,12 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;A medical insurance
+        company &lt;a 
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+        offers a gratis electronic toothbrush that snoops on its user
+        by sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
   &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
         designed &lt;a 
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
         listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
@@ -1188,6 +1251,17 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt;Some &ldquo;Smart&rdquo; 
TVs
+      automatically &lt;a 
href="https://news.ycombinator.com/item?id=16727319"&gt;load
+      downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to the article for the facts it presents. It is too bad
+      that the article finishes by advocating the moral weakness of
+      surrendering to Netflix. The Netflix
+      app &lt;a 
href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+      malware too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
+
   &lt;li&gt;
     &lt;p&gt;Vizio
     &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
@@ -1287,11 +1361,18 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
+  &lt;li&gt;
+    <span class="inserted"><ins><em>&lt;p&gt;ArenaNet surreptitiously 
installed a spyware program along with an
+      update to the massive multiplayer game Guild War 2.  The spyware
+      allowed ArenaNet &lt;a 
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+      to snoop on all open processes running on its user's
+      computer&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li&gt;
+  &lt;li&gt;</em></ins></span>
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a 
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
         to China&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
       users identify themselves and then sends personal data about them to
@@ -1374,29 +1455,10 @@
    but the surveillance is an abuse all the same.&lt;/p&gt;
 
 &lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;
-    &lt;p&gt;Some JavaScript malware &lt;a
-    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
-    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Some websites send JavaScript code to collect all the user's
-    input, &lt;a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
 can then
-        be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-
-  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a <span 
class="removed"><del><strong>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to</em></ins></span> snoop on information that users have typed into a 
form but not
-        <span 
class="removed"><del><strong>sent&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>sent&lt;/a&gt;, in order to learn their 
identity. Some are &lt;a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;p&gt; The Storyful
+      program &lt;a 
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+      on the reporters that use it&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;</em></ins></span>
 
   &lt;li&gt;&lt;p&gt;When a page uses Disqus for
   comments, &lt;a 
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;the
@@ -1411,12 +1473,12 @@
       servers, but proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/"&gt;</em></ins></span>
       Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
-      &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+  &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a <span 
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</strong></del></span>
+      <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;</em></ins></span>
       enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even
       users that don't have Facebook accounts.&lt;/p&gt;
   &lt;/li&gt;
@@ -1446,6 +1508,47 @@
 
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 &lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Spyware in JavaScript and Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Some websites send JavaScript code to collect all the user's
+    input, &lt;a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
 can then
+        be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many web sites use JavaScript code &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    to snoop on information that users have typed into a form but not
+    sent&lt;/a&gt;, in order to learn their identity. Some are &lt;a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash Player's
+      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Flash and JavaScript are also used for
+      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify 
users.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInChrome"&gt;Spyware in Chrome&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -1474,27 +1577,6 @@
 &lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Spyware in Flash&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Flash Player's
-      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Flash is also used for
-      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;p&gt;&lt;a href="/philosophy/javascript-trap.html"&gt;JavaScript 
code&lt;/a&gt;
-is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
-
-
 &lt;!-- #SpywareInDrones --&gt;
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareInDrones"&gt;Spyware in Drones&lt;/h3&gt;
@@ -1599,17 +1681,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, 2018 Free Software Foundation, 
Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/01/18 08:33:37 $
+$Date: 2018/07/18 02:59:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]