[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary proprietary-surveillance.de.htm...
From: |
GNUN |
Subject: |
www/proprietary proprietary-surveillance.de.htm... |
Date: |
Tue, 17 Jul 2018 22:59:29 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/07/17 22:59:29
Modified files:
proprietary : proprietary-surveillance.de.html
proprietary/po : proprietary-surveillance.de-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.de.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.7&r2=1.8
Patches:
Index: proprietary-surveillance.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.de.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-surveillance.de.html 18 Mar 2018 02:59:37 -0000 1.34
+++ proprietary-surveillance.de.html 18 Jul 2018 02:59:28 -0000 1.35
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-surveillance.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-surveillance.de.po">
+ https://www.gnu.org/proprietary/po/proprietary-surveillance.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-surveillance.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-surveillance.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-05-19" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-surveillance.en.html" -->
<!--#include virtual="/server/header.de.html" -->
<!-- Parent-Version: 1.84 -->
@@ -30,6 +35,7 @@
<!-- GNUN: localize URL /graphics/dog.small.jpg -->
<!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
<!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
<h2>Proprietäre Ãberwachung </h2>
<p>Unfreie (proprietäre) Software entspricht sehr häufig einem Schadprogramm
@@ -2001,7 +2007,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2018/03/18 02:59:37 $
+$Date: 2018/07/18 02:59:28 $
<!-- timestamp end -->
</p>
Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-surveillance.de-diff.html 18 Jan 2018 08:33:37 -0000
1.7
+++ po/proprietary-surveillance.de-diff.html 18 Jul 2018 02:59:29 -0000
1.8
@@ -110,7 +110,7 @@
<li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
<ul>
<li><a href="#SpywareInChrome">Spyware in
Chrome</a></li>
- <li><a href="#SpywareInFlash">Spyware in
Flash</a></li>
+ <li><a href="#SpywareInFlash">Spyware in JavaScript and
Flash</a></li>
</ul>
</li>
<li><a href="#SpywareInDrones">Spyware in
Drones</a></li>
@@ -190,17 +190,17 @@
<p>Furthermore, for users who installed the fourth stable build of
Windows 10, called the “Creators Update,” Windows maximized
the
-<span class="removed"><del><strong>surveillance <a</strong></del></span>
- <span class="inserted"><ins><em>surveillance<a</em></ins></span>
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
- by force setting the telemetry mode to <span
class="removed"><del><strong>“Full”</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>“Full”</a>.</p>
+ surveillance<a
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+ by force setting the telemetry mode to
“Full”</a>.</p>
<p>The <a
-href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level">
+<span
class="removed"><del><strong>href="https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#full-level"></strong></del></span>
+<span
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"></em></ins></span>
“Full” telemetry mode</a> allows Microsoft Windows
engineers to access, among other things, registry keys
<a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
can contain sensitive information like administrator's login
- password</a>.</p></li></em></ins></span>
+ password</a>.</p></li>
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
@@ -287,9 +287,9 @@
secret NSA key in Windows</a>, whose functions we don't
know.</p>
</li>
- <span class="inserted"><ins><em><li>HP's proprietary
+ <li>HP's proprietary
operating system <a
href="http://www.bbc.com/news/technology-42309371">includes
- a proprietary keyboard driver with a key logger in
it</a>.</li></em></ins></span>
+ a proprietary keyboard driver with a key logger in it</a>.</li>
</ul>
<p>Microsoft's snooping on users did not start with Windows 10.
@@ -352,7 +352,28 @@
<ul>
<li>
- <span class="inserted"><ins><em><p>20 dishonest Android apps
+ <span class="inserted"><ins><em><p>More
+ than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to
+ snoop and collect information about its users</a>. 40% of the
+ apps were found to insecurely snitch on its users. Furthermore,
+ they could detect only some methods of snooping, in these
+ proprietary apps whose source code they cannot look at. The other
+ apps might be snooping in other ways.</p>
+
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users need
+ to get rid of the proprietary software—both proprietary Android
+ by <a href="https://replicant.us">switching to Replicant</a>,
and
+ the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a>
+ that <a href="https://f-droid.org/wiki/page/Antifeatures">
+ prominently warns the user if an app contains
+ anti-features</a>.</p>
+</li>
+
+<li></em></ins></span>
+ <p>20 dishonest Android apps
recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
@@ -384,7 +405,7 @@
Google to protect us. We must demand release of source code to the
public, so we can depend on each other.</p>
</li>
-<li></em></ins></span>
+<li>
<p>A
<a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security
@@ -553,11 +574,11 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>The DMCA and the EU
Copyright Directive make it <a
+ <li><p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr...apps spy on users</a>, because this
would require circumventing the iOS DRM.</p>
- </li></em></ins></span>
+ </li>
<li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
obvious way <a
@@ -573,7 +594,7 @@
taken. Users would have no way to tell whether the phone is snooping on
them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ <li><p>iPhones <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can
get them from there.</p>
</li>
@@ -583,7 +604,9 @@
days.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ <li><p>Users cannot make an Apple ID <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
+<span
class="inserted"><ins><em>href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
+ (necessary</em></ins></span> to install even gratis apps)</a>
without giving a valid email address and receiving the code Apple
sends to it.</p>
</li>
@@ -665,7 +688,7 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>Tracking software in
popular Android apps is pervasive and
+ <li><p>Tracking software in popular Android apps is pervasive and
sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
@@ -675,7 +698,7 @@
<li><p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
even when “location services” are turned off, even
- when the phone has no SIM
card</a>.</p></li></em></ins></span>
+ when the phone has no SIM card</a>.</p></li>
<li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
sold with spyware sending lots of data to
China</a>.</p></li>
@@ -734,10 +757,43 @@
</div>
<ul>
- <span class="inserted"><ins><em><li><p>AI-powered driving apps
can
+ <span class="inserted"><ins><em><li><p>The Spanish football
streaming app
+ <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
+ microphone</a>.</p>
+
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no way to
+ save a recording. But I can't be sure from the article.</p>
+
+ <p>If you learn to care much less about sports, you will benefit
+ in many ways. This is one more.</p>
+ </li>
+
+ <li><p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
+
+ <p>Grindr should not have so much information about its users.
+ It could be designed so that users communicate such info to each other
+ but not to the server's database.</p>
+ </li></em></ins></span>
+
+ <li>
+ <p>The moviepass app and dis-service spy on users even more than
users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
+ </li>
+
+ <li><p>AI-powered driving apps can
<a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p>
- </li></em></ins></span>
+ </li>
<li><p>The Sarahah app
<a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
@@ -880,11 +936,11 @@
<ul>
<li>
- <span class="inserted"><ins><em><p>A remote-control sex toy was
found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
of the conversation between two users</a>.</p>
</li>
- <li></em></ins></span>
+ <li>
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
a speech recognition company based in the U.S.</p>
@@ -925,11 +981,12 @@
to its customers.</p>
</li>
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
- collected by the manufacturer's snooping.</p>
+ <li><p> “CloudPets” toys with microphones <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers</em></ins></span> found a way to access the data</a>
collected by the
+ manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
conversations
was unacceptable by itself.</p></li>
@@ -1156,6 +1213,12 @@
<div style="clear: left;"></div>
<ul>
+ <span class="inserted"><ins><em><li><p>A medical insurance
+ company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user
+ by sending usage data back over the Internet</a>.</p>
+ </li></em></ins></span>
+
<li><p>Lots of “smart” products are
designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
listen to everyone in the house, all the time</a>.</p>
@@ -1188,6 +1251,17 @@
before Amazon “smart” TVs.</p>
<ul>
+ <span class="inserted"><ins><em><li><p>Some “Smart”
TVs
+ automatically <a
href="https://news.ycombinator.com/item?id=16727319">load
+ downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to the article for the facts it presents. It is too bad
+ that the article finishes by advocating the moral weakness of
+ surrendering to Netflix. The Netflix
+ app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
+ </li></em></ins></span>
+
<li>
<p>Vizio
“smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
@@ -1287,11 +1361,18 @@
<div style="clear: left;"></div>
<ul>
+ <li>
+ <span class="inserted"><ins><em><p>ArenaNet surreptitiously
installed a spyware program along with an
+ update to the massive multiplayer game Guild War 2. The spyware
+ allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running on its user's
+ computer</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li>
+ <li></em></ins></span>
<p>The driver for a certain gaming keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
to China</a>.</p>
- </li></em></ins></span>
+ </li>
<li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
users identify themselves and then sends personal data about them to
@@ -1374,29 +1455,10 @@
but the surveillance is an abuse all the same.</p>
<ul>
- <span class="inserted"><ins><em><li>
- <p>Some JavaScript malware <a
-
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
- swipes usernames from browser-based password managers</a>.</p>
- </li>
-
- <li>
- <p>Some websites send JavaScript code to collect all the user's
- input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
- be used to reproduce the whole session</a>.</p>
-
- <p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
- </li></em></ins></span>
-
- <li><p>Many web sites use JavaScript code <a <span
class="removed"><del><strong>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">to</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to</em></ins></span> snoop on information that users have typed into a
form but not
- <span
class="removed"><del><strong>sent</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>sent</a>, in order to learn their
identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p></em></ins></span>
- </li>
+ <span class="inserted"><ins><em><li><p> The Storyful
+ program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
+ on the reporters that use it</a>.
+ </p></li></em></ins></span>
<li><p>When a page uses Disqus for
comments, <a
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook">the
@@ -1411,12 +1473,12 @@
servers, but proprietary software contributes.</p>
</li>
- <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ <li><p><a <span
class="removed"><del><strong>href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techrepublic.com/blog/asian-technology/japanese-government-warns-baidu-ime-is-spying-on-users/"></em></ins></span>
Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
</li>
- <li><p>Pages that contain “Like” buttons
- <a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
+ <li><p>Pages that contain “Like” buttons <a <span
class="removed"><del><strong>href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"></em></ins></span>
enable Facebook to track visitors to those pages</a>—even
users that don't have Facebook accounts.</p>
</li>
@@ -1446,6 +1508,47 @@
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware in JavaScript and Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Some JavaScript malware <a
+
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ swipes usernames from browser-based password managers</a>.</p>
+ </li>
+
+ <li>
+ <p>Some websites send JavaScript code to collect all the user's
+ input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then
+ be used to reproduce the whole session</a>.</p>
+
+ <p>If you use LibreJS, it will block that malicious JavaScript
+ code.</p>
+ </li>
+
+ <li><p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a form but not
+ sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+ </li>
+
+ <li><p>Flash Player's
+ <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
+ cookie feature helps web sites track visitors</a>.</p>
+ </li>
+
+ <li><p>Flash and JavaScript are also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices</a> to identify
users.</p>
+ </li>
+</ul>
+
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<div class="big-subsection">
<h4 id="SpywareInChrome">Spyware in Chrome</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
@@ -1474,27 +1577,6 @@
</ul>
-<div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware in Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
-</div>
-
-<ul>
- <li><p>Flash Player's
- <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
- </li>
-
- <li><p>Flash is also used for
- <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a> to identify
users.</p>
- </li>
-</ul>
-
-<p><a href="/philosophy/javascript-trap.html">JavaScript
code</a>
-is another method of “fingerprinting” devices.</p>
-
-
<!-- #SpywareInDrones -->
<div class="big-section">
<h3 id="SpywareInDrones">Spyware in Drones</h3>
@@ -1599,17 +1681,18 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
-Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
+<span
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/">Creative</em></ins></span>
+Commons <span
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span>
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International
License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/18 08:33:37 $
+$Date: 2018/07/18 02:59:29 $
<!-- timestamp end -->
</p>
</div>
- www/proprietary proprietary-surveillance.de.htm...,
GNUN <=