[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-appliances.de-diff.h...
From: |
GNUN |
Subject: |
www/proprietary/po malware-appliances.de-diff.h... |
Date: |
Mon, 1 Oct 2018 05:59:23 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/01 05:59:22
Modified files:
proprietary/po : malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po
proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary-tethers.de.po
proprietary-tethers.fr.po
proprietary-tethers.ja-diff.html
proprietary-tethers.ja.po
proprietary-tethers.pot
proprietary-tethers.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.402&r2=1.403
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.44&r2=1.45
Patches:
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- malware-appliances.de-diff.html 1 Oct 2018 07:58:14 -0000 1.7
+++ malware-appliances.de-diff.html 1 Oct 2018 09:59:21 -0000 1.8
@@ -58,7 +58,7 @@
<li <span class="removed"><del><strong>id="nest-thermometers">
<p>Nest thermometers
send</strong></del></span> <span
class="inserted"><ins><em>id="M201809260">
- <p>Honeywell's "smart" thermostats communicate
+ <p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</strong></del></span>
@@ -652,65 +652,65 @@
href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
<a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p>
-</li>
+IOActive Labs Research blog</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app developers. That is clearly true
+ if the apps are proprietary software.</p>
-<li>
-<p>Lots of <a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ <p>Anything whose name is “Smart” is most likely going
+ to screw you.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>Lots of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604110">
+ <p>Malware was found on</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
hospital equipment has lousy security</a>, and it can be fatal.</p>
</li>
<li>
<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken over</a> and turned
-into a botnet for</strong></del></span> <span class="inserted"><ins><em>app
developers. That is clearly true
- if</em></ins></span> the <span class="removed"><del><strong>purpose of
collecting customers' credit card
-numbers.</p></strong></del></span> <span class="inserted"><ins><em>apps
are proprietary software.</p>
-
- <p>Anything whose name is “Smart” is most likely going
- to screw you.</p></em></ins></span>
- </li>
-
- <li <span class="removed"><del><strong>id="vizio-snoop">
-<p>Vizio</strong></del></span> <span
class="inserted"><ins><em>id="M201604110">
- <p>Malware was found on</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
-used a firmware “upgrade” to make its TVs
snoop</strong></del></span>
+Point-of-sale terminals running Windows were taken
over</a></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.</p>
- <p>A camera that records locally</em></ins></span> on <span
class="removed"><del><strong>what
-users watch</a>. The TVs did</strong></del></span> <span
class="inserted"><ins><em>physical media, and has no network
- connection, does</em></ins></span> not <span
class="removed"><del><strong>do that when first
sold.</p></strong></del></span> <span class="inserted"><ins><em>threaten
people with surveillance—neither
- by watching people through the camera, nor through malware in the
+ <p>A camera that records locally on physical
media,</em></ins></span> and <span class="removed"><del><strong>turned
+into a botnet for</strong></del></span> <span class="inserted"><ins><em>has no
network
+ connection, does not threaten people with surveillance—neither
+ by watching people through</em></ins></span> the <span
class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.</p></strong></del></span> <span
class="inserted"><ins><em>camera, nor through malware in the
camera.</p></em></ins></span>
</li>
+ <li <span class="removed"><del><strong>id="vizio-snoop">
+<p>Vizio</strong></del></span> <span
class="inserted"><ins><em>id="M201604050">
+ <p>Google/Alphabet</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+used</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+ intentionally broke Revolv home automatic control products that
+ depended on</em></ins></span> a <span
class="removed"><del><strong>firmware
“upgrade”</strong></del></span> <span
class="inserted"><ins><em>server</a></em></ins></span> to <span
class="removed"><del><strong>make its TVs snoop on what
+users watch</a>.</strong></del></span> <span
class="inserted"><ins><em>function, by shutting down the
server.</em></ins></span>
+ The <span class="removed"><del><strong>TVs did not
do</strong></del></span> <span class="inserted"><ins><em>lesson is, reject all
such products. Insist on self-contained
+ computers</em></ins></span> that <span class="removed"><del><strong>when
first sold.</p></strong></del></span> <span class="inserted"><ins><em>run
free software!</p></em></ins></span>
+ </li>
+
<span class="removed"><del><strong><li>
<p>LG</strong></del></span>
- <span class="inserted"><ins><em><li id="M201604050">
- <p>Google/Alphabet</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
-disabled network features</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
- intentionally broke Revolv home automatic control products that
- depended</em></ins></span> on <span
class="removed"><del><strong><em>previously purchased</em>
+disabled network features</a> on <em>previously
purchased</em>
“smart” TVs, unless the purchasers agreed to let LG
-begin</strong></del></span> <span class="inserted"><ins><em>a
server</a></em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>function, by shutting down the server.
- The lesson is, reject all such products. Insist</em></ins></span> on
<span class="removed"><del><strong>them and distribute their personal
data.</p></strong></del></span> <span
class="inserted"><ins><em>self-contained
- computers that run free software!</p></em></ins></span>
- </li>
+begin to snoop on them and distribute their personal data.</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p><a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
Barbie is going</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>spy</a> on children and adults.</p>
</li>
@@ -733,7 +733,7 @@
printers. Now</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
<p>A “smart” device</strong></del></span> <span
class="inserted"><ins><em>is being discontinued, which</em></ins></span> means
<span class="inserted"><ins><em>that eventually
- authorized materials won't be available and</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to</strong></del></span>
<span class="inserted"><ins><em>printers may become
+ authorized materials won't be available and</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to
outsmart</strong></del></span> <span class="inserted"><ins><em>printers may
become
unusable.</p>
<p>With a <a
@@ -780,14 +780,13 @@
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
- to</em></ins></span> outsmart you.</p>
+ to outsmart</em></ins></span> you.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Vizio goes</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201511198">
- <p>ARRIS cable modem has</em></ins></span> a <span
class="removed"><del><strong>step further than</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>ARRIS cable modem has a <a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
back door in the back door</a>.</p>
</li>
@@ -795,7 +794,7 @@
<li id="M201511130">
<p>Some web and TV advertisements play inaudible
sounds to be picked up by proprietary malware running
- on</em></ins></span> other <span class="inserted"><ins><em>devices in
range so as to determine that they
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
@@ -871,10 +870,10 @@
the door to murder.</p>
</li>
- <li id="M201504300">
- <p>Vizio <a
+ <li id="M201504300"></em></ins></span>
+ <p>Vizio <span
class="removed"><del><strong>goes</strong></del></span> <span
class="inserted"><ins><em><a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
+ used</em></ins></span> a <span class="removed"><del><strong>step further
than</strong></del></span> <span class="inserted"><ins><em>firmware
“upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -888,8 +887,8 @@
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or some
- other government.</p>
+ Nuance can save it and would then have to give it to the US or
some</em></ins></span>
+ other <span class="inserted"><ins><em>government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
@@ -1197,7 +1196,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 07:58:14 $
+$Date: 2018/10/01 09:59:21 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-appliances.de.po 1 Oct 2018 07:58:14 -0000 1.56
+++ malware-appliances.de.po 1 Oct 2018 09:59:21 -0000 1.57
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -100,9 +100,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- malware-appliances.fr.po 1 Oct 2018 07:58:14 -0000 1.84
+++ malware-appliances.fr.po 1 Oct 2018 09:59:21 -0000 1.85
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-09-26 20:27+0200\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -83,9 +83,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-appliances.pot 1 Oct 2018 07:58:15 -0000 1.42
+++ malware-appliances.pot 1 Oct 2018 09:59:21 -0000 1.43
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,8 +64,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a "
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a "
"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\">
"
"surveillance, and danger of sabotage</a> (of a specific user, or of all "
"users at once), as well as the risk of an outage (which is what just "
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-appliances.ru.po 1 Oct 2018 07:58:15 -0000 1.113
+++ malware-appliances.ru.po 1 Oct 2018 09:59:22 -0000 1.114
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-09-26 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -83,9 +83,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-insecurity.de.po 1 Oct 2018 08:28:39 -0000 1.117
+++ proprietary-insecurity.de.po 1 Oct 2018 09:59:22 -0000 1.118
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -128,9 +128,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-insecurity.fr.po 1 Oct 2018 08:28:39 -0000 1.142
+++ proprietary-insecurity.fr.po 1 Oct 2018 09:59:22 -0000 1.143
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-09-26 20:27+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -111,9 +111,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-insecurity.it-diff.html 1 Oct 2018 08:28:39 -0000 1.14
+++ proprietary-insecurity.it-diff.html 1 Oct 2018 09:59:22 -0000 1.15
@@ -51,45 +51,45 @@
<em>helpless to fix any security problems that arise</em>.
Keeping the
users helpless is what's culpable about proprietary software.</p>
-<span class="removed"><del><strong><ul></strong></del></span>
+<span class="removed"><del><strong><ul>
+<li id="break-security-smarttv">
+ <p><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way</strong></del></span>
-<span class="inserted"><ins><em><p>If you know of an example that ought
to be in this page but isn't
+<span class="inserted"><ins><em><p>If you know of an example that
ought</em></ins></span> to <span class="removed"><del><strong>break security
on</strong></del></span> <span class="inserted"><ins><em>be in this page but
isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span
class="inserted"><ins><em>trustworthy reference or two
to present the specifics.</p>
-<ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="break-security-smarttv">
- <p><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers</strong></del></span> <span
class="inserted"><ins><em>id="M201809260">
- <p>Honeywell's "smart" thermostats communicate
+<ul class="blurbs">
+ <li id="M201809260">
+ <p>Honeywell's</em></ins></span> “smart” <span
class="removed"><del><strong>TV</a></strong></del></span> <span
class="inserted"><ins><em>thermostats communicate
only through the company's server. They have
all the nasty characteristics of such devices: <a
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
+ surveillance,</em></ins></span> and <span class="removed"><del><strong>use
its camera
+ to watch</strong></del></span> <span class="inserted"><ins><em>danger of
sabotage</a> (of a specific user, or of
all users at once), as well as the risk of an outage (which is what
just happened).</p>
<p>In addition, setting the desired temperature requires running
nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p>
+ using controls right on</em></ins></span> the <span
class="inserted"><ins><em>thermostat.</p>
</li>
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p>
+ hide voice commands in other audio</a>, so that</em></ins></span>
people <span class="removed"><del><strong>who are watching
TV.</p></strong></del></span> <span class="inserted"><ins><em>cannot hear
+ them, but Alexa and Siri can.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p>Many models</strong></del></span>
- <li id="M201808120">
- <p>Crackers</em></ins></span> found a way to break <span
class="removed"><del><strong>security on a “smart” TV</a> and
use its camera
- to watch</strong></del></span> the <span
class="removed"><del><strong>people who are watching TV.</p>
-</li>
-<li>
- <p>Many models</strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras</strong></del></span>
<span class="inserted"><ins><em>an Amazon device,
+ <span class="inserted"><ins><em><li id="M201808120">
+ <p>Crackers found a way to break the security</em></ins></span> of
<span class="removed"><del><strong>Internet-connected
cameras</strong></del></span> <span class="inserted"><ins><em>an Amazon device,
and</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -246,7 +246,7 @@
<span class="inserted"><ins><em><li id="M201705160">
<p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
pre-installed on 28 models</em></ins></span> of <span
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> <span class="inserted"><ins><em>HP laptops
logged</em></ins></span> the <span
class="removed"><del><strong>Internet,</strong></del></span> <span
class="inserted"><ins><em>user's keystroke
+<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> <span class="inserted"><ins><em>HP laptops logged the
user's keystroke
to a file in the filesystem. Any process with access to the filesystem
or the MapViewOfFile API could gain access to the log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
@@ -273,7 +273,7 @@
<p>When Miele's Internet of
Stings hospital disinfectant dishwasher is <a
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to the Internet,</em></ins></span> its security is
crap</a>.</p>
+ connected to</em></ins></span> the Internet, its security is
crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
filesystem, infect it with malware, and force the dishwasher to launch
@@ -924,7 +924,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 08:28:39 $
+$Date: 2018/10/01 09:59:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-insecurity.it.po 1 Oct 2018 08:28:39 -0000 1.133
+++ proprietary-insecurity.it.po 1 Oct 2018 09:59:22 -0000 1.134
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -121,9 +121,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-insecurity.ja-diff.html 1 Oct 2018 08:28:39 -0000 1.33
+++ proprietary-insecurity.ja-diff.html 1 Oct 2018 09:59:22 -0000 1.34
@@ -90,7 +90,7 @@
<ul class="blurbs">
<li id="M201809260">
- <p>Honeywell's "smart" thermostats communicate
+ <p>Honeywell's “smart” thermostats communicate
only through the company's server.</em></ins></span> They <span
class="removed"><del><strong>can be recovered
in various ways.
</p>
@@ -882,7 +882,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 08:28:39 $
+$Date: 2018/10/01 09:59:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary-insecurity.ja.po 1 Oct 2018 08:28:39 -0000 1.104
+++ proprietary-insecurity.ja.po 1 Oct 2018 09:59:22 -0000 1.105
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -102,9 +102,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary-insecurity.pot 1 Oct 2018 08:28:39 -0000 1.74
+++ proprietary-insecurity.pot 1 Oct 2018 09:59:22 -0000 1.75
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,8 +77,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a "
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a "
"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\">
"
"surveillance, and danger of sabotage</a> (of a specific user, or of all "
"users at once), as well as the risk of an outage (which is what just "
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary-insecurity.ru.po 1 Oct 2018 08:28:39 -0000 1.190
+++ proprietary-insecurity.ru.po 1 Oct 2018 09:59:22 -0000 1.191
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-09-26 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -108,9 +108,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary-surveillance.de.po 1 Oct 2018 07:58:15 -0000 1.230
+++ proprietary-surveillance.de.po 1 Oct 2018 09:59:22 -0000 1.231
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -3581,9 +3581,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- proprietary-surveillance.fr.po 1 Oct 2018 09:12:53 -0000 1.315
+++ proprietary-surveillance.fr.po 1 Oct 2018 09:59:22 -0000 1.316
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-10-01 11:11+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-01 09:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -2923,10 +2924,25 @@
"\">#SpywareAtHome</a>)</span>"
#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+# | Honeywell's [-\"smart\"-] {+“smart”+} thermostats communicate
+# | only through the company's server. They have all the nasty characteristics
+# | of such devices: <a
+# |
href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\">
+# | surveillance, and danger of sabotage</a> (of a specific user, or of all
+# | users at once), as well as the risk of an outage (which is what just
+# | happened).
+#, fuzzy
+#| msgid ""
+#| "Honeywell's \"smart\" thermostats communicate only through the company's "
+#| "server. They have all the nasty characteristics of such devices: <a href="
+#| "\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+#| "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
+#| "user, or of all users at once), as well as the risk of an outage (which "
+#| "is what just happened)."
+msgid ""
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-surveillance.it-diff.html 1 Oct 2018 07:58:15 -0000
1.70
+++ proprietary-surveillance.it-diff.html 1 Oct 2018 09:59:22 -0000
1.71
@@ -492,25 +492,13 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201509220"></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note that</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
- sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
- “clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>not really clean since</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
+ BIOS</a> on Windows installs. Note that</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis</strong></del></span> <span
class="inserted"><ins><em>specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
+ “clean” Windows install is not really clean since <a
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
own malware</a>.</p>
</li>
</ul>
@@ -518,9 +506,7 @@
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With</strong></del></span> <span
class="inserted"><ins><em>Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -535,37 +521,18 @@
<p>The natural extension of monitoring
people through “their” phones is <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
- proprietary <span class="removed"><del><strong>apps, one can only hope
that</strong></del></span> <span class="inserted"><ins><em>software to make
sure</em></ins></span> they <span
class="removed"><del><strong>don't.</p></strong></del></span> <span
class="inserted"><ins><em>can't “fool”
- the monitoring</a>.</p></em></ins></span>
+ proprietary <span class="removed"><del><strong>Android apps contained
recognizable tracking libraries. For</strong></del></span> <span
class="inserted"><ins><em>software to make sure they can't “fool”
+ the monitoring</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users by
- <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs of Android apps</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>collude</strong></del></span> <span
class="inserted"><ins><em>take over
+ <li id="M201510050">
+ <p>According to Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
- data</strong></del></span> <span class="inserted"><ins><em>turn the
phones on and off, listen</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+ them to turn the phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ read the contact list. This malware is designed to disguise itself
from investigation.</p>
</li>
@@ -574,25 +541,19 @@
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that</em></ins></span> this <span
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>does not
operate via</em></ins></span>
- the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>spell out
-what they</strong></del></span> <span class="inserted"><ins><em>we know nearly
all portable
- phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em><a
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
+ lots of bugs in the phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>users, instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>remote
command, and users cannot stop
- them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span class="inserted"><ins><em>will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
+ will send their GPS location on remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones
+ to have GPS.)</p>
</li>
</ul>
@@ -604,11 +565,10 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>other companies from getting</strong></del></span>
<span class="inserted"><ins><em>the EU Copyright Directive make it <a
+ <p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>,
because</em></ins></span>
- this <span class="removed"><del><strong>personal information
in</strong></del></span> <span class="inserted"><ins><em>would require
circumventing</em></ins></span> the <span class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p>
+ illegal to study how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
@@ -625,127 +585,135 @@
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on
them.</p></em></ins></span>
+ no way to tell whether the phone is snooping on them.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611170">
+ <li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>personal data to Apple's servers</a>. Big
Brother can get
+ lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
<li id="M201609280">
- <p>The iMessage app on iThings</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>; the
+ <p>The iMessage app on iThings <a
+
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30 days.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the
photos</em></ins></span>
- and <span class="removed"><del><strong>location
tracking,</strong></del></span> <span class="inserted"><ins><em>videos they
make.</p>
+ <p>iThings automatically upload to Apple's servers all the photos
+ and videos they make.</p>
- <blockquote><p> iCloud Photo Library stores every photo and
video</em></ins></span> you <span class="removed"><del><strong>must
- disable Google Play itself</strong></del></span>
- <span class="inserted"><ins><em>take, and keeps them up</em></ins></span>
to <span class="removed"><del><strong>completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
+ <blockquote><p> iCloud Photo Library stores every photo and
video you
+ take, and keeps them up to date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is
- <span class="removed"><del><strong>yet another
example</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated by the
- startup</em></ins></span> of <span class="removed"><del><strong>nonfree
software pretending</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>paid proprietary
apps,</strong></del></span>
+ <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
- <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but</em></ins></span> it's <span
class="removed"><del><strong>actually doing something else.
Such</strong></del></span> <span class="inserted"><ins><em>active by default so
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing
would be almost
- unthinkable</strong></del></span>
- <span class="inserted"><ins><em>surveillance functionality.</p>
+ <p>There is a way to
+ <a href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but it's active by default so</em></ins></span> it <span
class="removed"><del><strong>was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps</strong></del></span>
<span class="inserted"><ins><em>still counts</em></ins></span> as <span
class="removed"><del><strong>“free”,</strong></del></span> <span
class="inserted"><ins><em>a
+ surveillance functionality.</p>
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security to get at them,</em></ins></span> but <span
class="removed"><del><strong>most</strong></del></span> <span
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span
class="removed"><del><strong>are not in fact</strong></del></span> <span
class="inserted"><ins><em>through</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses the ugly word “monetize”. A good
replacement</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>that word is “exploit”; nearly always
that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>the state</a>.</p>
- <p>This may have improved</em></ins></span> with <span
class="removed"><del><strong>free software.</p></strong></del></span>
<span class="inserted"><ins><em><a
+ <p>This may have improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
not as much as Apple claims</a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>More</strong></del></span>
+<span class="removed"><del><strong><li>
+ <p>Apps</strong></del></span>
<span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other</em></ins></span> than <span
class="removed"><del><strong>73% of</strong></del></span> <span
class="inserted"><ins><em>surveillance</a>. Here is</em></ins></span>
the <span class="removed"><del><strong>most popular Android
apps</strong></del></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
+ Several “features” of iOS seem to exist</em></ins></span>
+ for <span class="removed"><del><strong>BART</strong></del></span> <span
class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here is the</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ Technical presentation</a>.</p></em></ins></span>
</li>
- <li id="M201401100">
- <p>The <a class="not-a-duplicate"
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401100">
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in</strong></del></span> <span
class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span class="removed"><del><strong>location
information</a> of their users with third
parties.</p></strong></del></span>
- <span class="inserted"><ins><em>get other info
too.</p></em></ins></span>
+ iBeacon</a> lets</em></ins></span> stores <span
class="removed"><del><strong>or played by TV programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>determine exactly where the iThing is, and
+ get other info too.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated to</strong></del></span>
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps can collude to transmit users'
personal</strong></del></span>
<span class="inserted"><ins><em><li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span class="inserted"><ins><em>NSA snoop on
all</em></ins></span> the <span class="removed"><del><strong>500 most popular
gratis Android apps</a>.</p></strong></del></span> <span
class="inserted"><ins><em>data in an iThing, or it
- is totally incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the</em></ins></span> data <span
class="removed"><del><strong>to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>in an iThing, or it
+ is totally incompetent</a>.</p></em></ins></span>
</li>
- <li id="M201308080"></em></ins></span>
- <p>The <span class="removed"><del><strong>article should not have
described these apps as
- “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308080">
+ <p>The iThing also</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>install the app</a>.</p>
+
+<p>Merely asking the “consent” of
users</strong></del></span> <span class="inserted"><ins><em>can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There is also a feature for web sites</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price”</strong></del></span> <span
class="inserted"><ins><em>track users, which</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
-
- <p>The</strong></del></span> <span class="inserted"><ins><em><a
+ <p>There</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span> <span class="inserted"><ins><em>also a feature for
web sites</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most users have
+stopped reading the “Terms and Conditions” that spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects on</strong></del></span>
<span class="inserted"><ins><em>track</em></ins></span> users, <span
class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</em></ins></span> article <span
class="removed"><del><strong>takes for granted that the usual analytics tools
are
- legitimate,</strong></del></span> <span class="inserted"><ins><em>talks
about iOS 6,</em></ins></span> but <span
class="inserted"><ins><em>it</em></ins></span> is <span
class="removed"><del><strong>that valid? Software developers have no
right</strong></del></span>
- <span class="inserted"><ins><em>still true in iOS 7.)</p>
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
+ still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
</li>
<li id="M201204280">
- <p>Users cannot make an Apple ID (<a
+ <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">
- necessary</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
- email address and receiving the verification code Apple sends
+ necessary</em></ins></span> to <span class="removed"><del><strong>truly
protect people's privacy, we must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
to it.</p>
</li>
</ul>
@@ -760,56 +728,90 @@
<li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services”</em></ins></span> are
- <span class="removed"><del><strong>just as wrong as any other
snooping.</p></strong></del></span> <span
class="inserted"><ins><em>turned off, even when
- the phone has no SIM card</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but not</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611150">
- <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
- </li>
-
- <li id="M201609140">
- <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
+ </li>
+
+ <li id="M201611150">
+ <p>Some portable phones <a
+
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609140"></em></ins></span>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>location
tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>tracking. This</em></ins></span> is <span
class="removed"><del><strong>present in some Android
devices</strong></del></span>
- <span class="inserted"><ins><em>yet another example of nonfree software
pretending to obey the user,</em></ins></span>
- when <span class="removed"><del><strong>they are sold.
- Some Motorola</strong></del></span> <span class="inserted"><ins><em>it's
actually doing something else. Such a thing would be almost
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
- <li id="M201507030">
- <p>Samsung</em></ins></span> phones <span
class="removed"><del><strong>modify Android to</strong></del></span> <span
class="inserted"><ins><em>come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>, and they</em></ins></span> send <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>so much</em></ins></span> data <span
class="removed"><del><strong>to Motorola</a>.</p>
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute
spying</em></ins></span>
+ of <span class="removed"><del><strong>their users with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>some
kind.</p></em></ins></span>
</li>
- <li><p>Some manufacturers add</strong></del></span> <span
class="inserted"><ins><em>that their
- transmission is</em></ins></span> a
- <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span> <span
class="inserted"><ins><em>substantial expense for users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some kind.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</em></ins></span> to <span
class="inserted"><ins><em>any file on</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>system.</p>
</li>
- <span
class="removed"><del><strong><li><p><a</strong></del></span>
+ <li id="M201308010">
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>the 500 most popular gratis</strong></del></span>
Android <span class="removed"><del><strong>apps</a>.</p>
- <span class="inserted"><ins><em><li id="M201403120">
- <p><a</em></ins></span>
href="/proprietary/proprietary-back-doors.html#samsung">
+ <p>The article should not have described these apps as
+ “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to
say
+ “zero price” is “gratis.”</p>
+
+ <p>The</strong></del></span> <span class="inserted"><ins><em>Wall
Street
+ Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
+ the <span class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>phones</em></ins></span>
+ and <span class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a>. (I suspect this means Windows
laptops.) Here is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
+ <p>Spyware</em></ins></span> is present in some Android devices when
+ they are sold. Some Motorola phones modify Android to <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the
system.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
@@ -824,32 +826,20 @@
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201308010">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
<ul>
- <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us by a paywall) reports
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
— which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the <span class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in
Android phones
- and laptops</a>. (I suspect this means Windows laptops.)
Here</em></ins></span> is <span class="removed"><del><strong>snooping on
+ taken. Users would have no way to tell whether the phone is snooping on
them.</p></li>
- <li><p>iPhones</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
lots of</strong></del></span>
- <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li id="M201307280">
- <p>Spyware is present in some Android devices when
- they are sold. Some Motorola phones modify Android to <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
send</em></ins></span> personal data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
@@ -954,14 +944,25 @@
iBeacon</a> lets stores determine exactly
where</strong></del></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span
class="inserted"><ins><em>Swindle</em></ins></span> and <span
class="removed"><del><strong>get</strong></del></span> other <span
class="removed"><del><strong>info too.</p></strong></del></span> <span
class="inserted"><ins><em>e-readers</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users,</strong></del></span>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6, but it
+ is still true</strong></del></span>
<span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even</em></ins></span> which <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>page the user reads at what time</a>.</p>
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>many e-readers—not only the
Kindle:</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page the user reads at what
time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -978,156 +979,146 @@
<ul class="blurbs">
<li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS
6,</strong></del></span>
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+ record</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user's location even when users disable
“location
tracking”</a>.</p>
<p>There are other ways to turn off the other kinds of location
- tracking,</em></ins></span> but <span class="removed"><del><strong>it
- is still true in iOS 7.)</p></strong></del></span> <span
class="inserted"><ins><em>most users will be tricked by the misleading
control.</p></em></ins></span>
+ tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
<span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that
can</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>user's movements and
listens through</em></ins></span> the <span class="removed"><del><strong>data
in an iThing,
+ or</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't</em></ins></span> be
- <span class="removed"><del><strong>turned
off.</p></strong></del></span> <span class="inserted"><ins><em>sure from
the article.</p>
+ <p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>totally
incompetent.</a></p>
+ </li>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist
for</strong></del></span> no
+ <span class="removed"><del><strong>possible purpose other than
surveillance</a>. Here is</strong></del></span> <span
class="inserted"><ins><em>way to save
+ a recording. But I can't be sure from</em></ins></span> the
+ <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>According</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to</em></ins></span> snoop <span class="removed"><del><strong>on
all</strong></del></span>
- <span class="inserted"><ins><em>and collect information about its
users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>an iThing,
- or it</strong></del></span> <span class="inserted"><ins><em>these
proprietary apps whose
+ of the 5,855 Android apps studied</em></ins></span> by <span
class="removed"><del><strong>sending hidden text messages which enable
them</strong></del></span> <span class="inserted"><ins><em>researchers were
found</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>snoop
+ and collect information about its users</a>. 40%
of</em></ins></span> the <span
class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>apps were
+ found to insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
- <p>This</em></ins></span> is <span
class="removed"><del><strong>totally incompetent.</a></p>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
+ need</em></ins></span> to <span class="inserted"><ins><em>get rid
of</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>read</strong></del></span> the
<span class="removed"><del><strong>contact list. This malware is designed to
+ disguise itself</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps</em></ins></span>
from <span class="removed"><del><strong>investigation.</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>the proprietary software—both proprietary
- Android by <a
href="https://replicant.us">switching</em></ins></span> to <span
class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here
is</strong></del></span> <span class="inserted"><ins><em>Replicant</a>,
- and the proprietary apps by getting apps from</em></ins></span> the <span
class="inserted"><ins><em>free software
- only</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
+ <li><p>Samsung phones come with</strong></del></span> <span
class="inserted"><ins><em>the free software
+ only</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
<span class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="inserted"><ins><em><a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains
anti-features</a>.</p></em></ins></span>
+ the user if an app contains anti-features</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-
-<ul>
- <li><p>According to Edward Snowden,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"></em></ins></span>
- which <span class="removed"><del><strong>enable them</strong></del></span>
<span class="inserted"><ins><em>users are HIV-positive, then provides the
information to
+ <li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which</em></ins></span> users <span class="removed"><del><strong>can't
delete</a>,
+ and they send</strong></del></span> <span class="inserted"><ins><em>are
HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
- other but not</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> the <span
class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
+ <p>Grindr should not have</em></ins></span> so much <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>information about its users.
+ It could be designed so</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
<p>The moviepass app and dis-service
- spy</em></ins></span> on <span class="inserted"><ins><em>users even more
than users expected. It <a
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and <span
class="removed"><del><strong>off, listen</strong></del></span> <span
class="inserted"><ins><em>after going</em></ins></span> to <span
class="removed"><del><strong>the microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call,
location</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software in popular Android apps
- is pervasive</em></ins></span> and <span class="removed"><del><strong>web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
+ <p>Tracking software in popular Android apps</em></ins></span>
+ is <span class="inserted"><ins><em>pervasive and sometimes very clever.
Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
+ follow</em></ins></span> a
+ <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted or
+ requested</strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store</em></ins></span> by <span
class="removed"><del><strong>the user, clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>contact list.
This malware is designed</strong></del></span> <span
class="inserted"><ins><em>words
+ <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads</em></ins></span> all <span class="inserted"><ins><em>phone
numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>zero price.</p></em></ins></span>
+ referring to zero price.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
-
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that,</em></ins></span> and <span
class="inserted"><ins><em>deleted these apps after
- discovering what</em></ins></span> they <span
class="removed"><del><strong>send so much data that their transmission is a
- substantial expense</strong></del></span> <span
class="inserted"><ins><em>did. So we cannot blame Google
specifically</em></ins></span>
- for <span class="removed"><del><strong>users. Said transmission, not
wanted or
- requested by</strong></del></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>these apps.</p>
-
- <p>On</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>other hand, Google redistributes
nonfree</em></ins></span> Android <span class="removed"><del><strong>phones
(and Windows? laptops): The Wall
+ <p>20 dishonest</em></ins></span> Android <span
class="removed"><del><strong>phones (and Windows? laptops): The Wall
Street Journal (in an article blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> and <span
class="removed"><del><strong>microphone</strong></del></span>
- <span class="inserted"><ins><em>therefore shares</em></ins></span> in
<span class="removed"><del><strong>Android
- phones and laptops</a>.
+ reports that</strong></del></span> <span class="inserted"><ins><em>apps
recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls</em></ins></span> and <span class="removed"><del><strong>microphone
in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>sent
them</em></ins></span> and <span class="removed"><del><strong>laptops</a>.
(I suspect this means Windows laptops.) Here is
<a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li><p>Portable phones with GPS will send</strong></del></span>
<span class="inserted"><ins><em>the responsibility for the injustice
of</em></ins></span> their <span class="removed"><del><strong>GPS location on
- remote command and users cannot stop them:</strong></del></span> <span
class="inserted"><ins><em>being
+ <li><p>Portable phones with GPS will send their GPS
location</strong></del></span> <span class="inserted"><ins><em>text messages
and emails to snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy;</em></ins></span> on
+ <span class="removed"><del><strong>remote command</strong></del></span>
<span class="inserted"><ins><em>the contrary, it
+ worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>deleted these apps after
+ discovering what they did. So we</em></ins></span> cannot <span
class="removed"><del><strong>stop them:</strong></del></span> <span
class="inserted"><ins><em>blame Google specifically
+ for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
@@ -1139,20 +1130,21 @@
</li>
<li><p>The nonfree Snapchat app's principal
purpose</strong></del></span> <span class="inserted"><ins><em>done a better job
of preventing apps from
- cheating? There</em></ins></span> is <span class="inserted"><ins><em>no
systematic way for Google, or Android users,</em></ins></span>
- to <span class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
+ cheating? There</em></ins></span> is <span class="inserted"><ins><em>no
systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and
study</em></ins></span>
- the <span class="removed"><del><strong>user's computer,
but</strong></del></span> <span class="inserted"><ins><em>source code somehow
to determine whether they mistreat users in
- various ways. If</em></ins></span> it <span
class="removed"><del><strong>does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
<span class="inserted"><ins><em>did a good job of this,</em></ins></span> it
<span class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>could more or less
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
- enough</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>user's list</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+ enough</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>source code to the
- public, so we can depend on each other.</p></em></ins></span>
+ Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>data on the user's computer, but it does
surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span> <span class="inserted"><ins><em>source
code</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="removed"><del><strong>user's list of other people's phone
+ numbers.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1234,7 +1226,7 @@
<span class="inserted"><ins><em><li id="M201701210">
<p>The</em></ins></span> Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user <span class="removed"><del><strong>data to a Chinese
company</a>.</p></li>
+ <span class="removed"><del><strong>user data to a Chinese
company</a>.</p></li>
<li><p>A pregnancy test controller application not only
can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
@@ -1242,7 +1234,8 @@
alter them too</a>.
</p></li>
- <li><p>The</strong></del></span> <span
class="inserted"><ins><em>data to a Chinese company</a>.</p>
+ <li><p>The</strong></del></span>
+ <span class="inserted"><ins><em>user data to a Chinese
company</a>.</p>
</li>
<li id="M201611280">
@@ -1583,10 +1576,10 @@
<li>
<p>The “smart” toys My Friend
Cayla</strong></del></span> <span class="inserted"><ins><em>their
users</em></ins></span> and <span class="removed"><del><strong>i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
+ a speech recognition company based in</strong></del></span> the <span
class="removed"><del><strong>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ can remotely control the toys with a mobile phone. This would
enable crackers to listen in on</strong></del></span>
<span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
@@ -1698,11 +1691,11 @@
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
+ spies on every process running</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>a gamer's computer
and sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection --></strong></del></span> <span
class="inserted"><ins><em>do with cheating.</p>
+ have nothing to do with cheating.</p>
</li>
</ul></em></ins></span>
@@ -1899,42 +1892,42 @@
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to</em></ins></span>
the <span class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>US or some
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition</em></ins></span> is
- <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span class="inserted"><ins><em>not to be
trusted unless</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from</strong></del></span> <span class="inserted"><ins><em>is done
by free
- software in your own computer.</p>
-
- <p>In</em></ins></span> its <span
class="removed"><del><strong>users</a>.</p>
+ <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>trusted
unless it is done by free</em></ins></span>
+ software in <span class="removed"><del><strong>the
car</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>privacy policy, Samsung explicitly confirms that <a
+ <p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="inserted"><ins><em>third
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ <p>The Amazon “Smart” TV</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
</li>
<li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ on their</em></ins></span> users</a>.</p>
+
+ <span class="removed"><del><strong><p>Even if no one
connects</strong></del></span>
- <p>The report was as of 2014, but we don't expect this has got
+ <span class="inserted"><ins><em><p>The report was as of 2014, but we
don't expect this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to
<span class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>get users' formal
+ <p>This shows that laws requiring products</em></ins></span> to
<span class="inserted"><ins><em>get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>TV will
- say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>physically remove</strong></del></span>
<span class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
@@ -2200,7 +2193,7 @@
<ul class="blurbs">
<li id="M201809260">
- <p>Honeywell's "smart" thermostats communicate
+ <p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
watching</strong></del></span>
@@ -2782,7 +2775,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 07:58:15 $
+$Date: 2018/10/01 09:59:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- proprietary-surveillance.it.po 1 Oct 2018 07:58:15 -0000 1.243
+++ proprietary-surveillance.it.po 1 Oct 2018 09:59:22 -0000 1.244
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3328,9 +3328,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-surveillance.ja-diff.html 1 Oct 2018 07:58:15 -0000
1.81
+++ proprietary-surveillance.ja-diff.html 1 Oct 2018 09:59:22 -0000
1.82
@@ -1598,7 +1598,7 @@
approve sending personal data to the app developer but did not ask
about sending it to other companies. This shows the weakness of
the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should a flashlight app send</em></ins></span> any <span
class="removed"><del><strong>time. (See</strong></del></span> <span
class="inserted"><ins><em>information to
+ surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
@@ -1836,9 +1836,8 @@
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -1863,8 +1862,7 @@
<li id="M201405200">
<p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store</strong></del></span> <span class="inserted"><ins><em>the switch
to turn</em></ins></span> this <span
class="removed"><del><strong>information,</strong></del></span> <span
class="inserted"><ins><em>off has
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
@@ -1872,8 +1870,8 @@
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop
this,</em></ins></span> but <span class="inserted"><ins><em>any
- product could spy this way.</p>
+ <p>LG later said it had installed a patch to stop this,
but</em></ins></span> any <span class="removed"><del><strong>time.
(See</strong></del></span>
+ <span class="inserted"><ins><em>product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
@@ -1896,34 +1894,36 @@
<ul class="blurbs">
<li id="M201710040">
- <p>Every “home security” camera,</em></ins></span> if
<span class="inserted"><ins><em>its
+ <p>Every “home security” camera, if its
manufacturer can communicate with it, is a surveillance device. <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on
+ <p>The article describes wrongdoing by the manufacturer, based on
the fact that the device is tethered to a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</em></ins></span> it <span class="inserted"><ins><em>also
demonstrates that the device gives the company
+ <p>But it also demonstrates that the device gives the company
surveillance capability.</p>
</li>
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>watch through them</a>.</p>
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
<li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span class="removed"><del><strong>data
- and hand</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
+ <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span class="removed"><del><strong>state
orders</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="removed"><del><strong>to get</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p>
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>over, the state can store it.</p>
</li>
</ul>
@@ -1939,7 +1939,7 @@
<ul>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+ Rent-to-own computers were programmed</strong></del></span>
to <span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
</ul>
@@ -1982,99 +1982,82 @@
<p>The <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> was <span
class="removed"><del><strong>as</strong></del></span> <span
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent to tracking,</strong></del></span>
<span class="inserted"><ins><em>vibrator minute by
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>vibration
frequency.</p>
-
- <p>Note</em></ins></span> the <span
class="removed"><del><strong>user watches — no exceptions!</p>
- </li>
- <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>totally inadequate proposed
response:</em></ins></span> a <span class="removed"><del><strong>step further
than other TV</strong></del></span> <span class="inserted"><ins><em>labeling
- standard with which</em></ins></span> manufacturers <span
class="removed"><del><strong>in spying on
- their users:</strong></del></span> <span class="inserted"><ins><em>would
make statements about</em></ins></span> their <span
class="removed"><del><strong><a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span class="inserted"><ins><em>products, rather than free software which
users could have checked</em></ins></span>
- and
- <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>changed.</p>
+ body), as well as the vibration frequency.</p>
- <p>The company</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
- across devices.</p>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
- <p>It is possible to turn this off,</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+ <p>The company</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+ consent before</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
+ was sued for</em></ins></span> collecting <span
class="inserted"><ins><em>lots of</em></ins></span> personal <span
class="inserted"><ins><em>information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> it <span
class="removed"><del><strong>enabled by default
- is an injustice already.</p>
+ <p>The company's statement that it was anonymizing
the</em></ins></span> data <span class="removed"><del><strong>are totally
inadequate.
+ And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>may be
+ true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
+ user <span class="removed"><del><strong>watches — no
exceptions!</p>
</li>
+ <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>was.</p>
- <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>doesn't really
matter. If it had sold the data</em></ins></span> to <span
class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>600
millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
-
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span class="inserted"><ins><em>pay a
total of C$4m</a></em></ins></span> to <span
class="removed"><del><strong>determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> <span class="inserted"><ins><em>its
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>Web activity, and
- other</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize
and</strong></del></span>
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span> <span class="inserted"><ins><em>way to
access the data</a> collected by the
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>FBI could listen to these
- conversations was unacceptable by itself.</p></em></ins></span>
+ <p>That the manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>these
+ conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>default
+ is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
<span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>.</strong></del></span> Nuance <span
class="inserted"><ins><em>Communications</a>, a speech recognition
- company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>save it and</strong></del></span>
<span class="inserted"><ins><em>remotely control the toys with a mobile phone.
This</em></ins></span> would <span class="removed"><del><strong>then have to
- give it</strong></del></span> <span class="inserted"><ins><em>enable
- crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>US or some other government.</p>
- <p>Speech recognition is not</strong></del></span>
- <span class="inserted"><ins><em>toys themselves.</p>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
+ company based in</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>toys</em></ins></span> with <span
class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p>
</li>
<li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it</strong></del></span> <span class="inserted"><ins><em>spy on children
and adults</a>.</p>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
</li>
</ul>
@@ -2086,13 +2069,17 @@
<ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI</em></ins></span> is <span
class="removed"><del><strong>done
- by free software</strong></del></span> in <span
class="removed"><del><strong>your own computer.</p></strong></del></span>
<span class="inserted"><ins><em>many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>people, DJI is</em></ins></span> in
+ <span class="removed"><del><strong>range so as to determine that they
are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>many
cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -2102,33 +2089,48 @@
<ul class="blurbs">
<li id="M201809260">
- <p>Honeywell's "smart" thermostats communicate
+ <p>Honeywell's</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize and
+ <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
+ even if it isn't a TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>thermostats communicate
only through the company's server. They have
- all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports</strong></del></span>
+ all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all users at once), as well as the risk of an outage (which
is</em></ins></span> what
- <span class="inserted"><ins><em>just happened).</p>
-
- <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>user watches, and</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>thermostat.</p>
+ surveillance,</em></ins></span> and <span
class="removed"><del><strong>listening</strong></del></span> <span
class="inserted"><ins><em>danger of sabotage</a> (of a specific user, or
of</em></ins></span>
+ all <span class="inserted"><ins><em>users at once), as well
as</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+ <li><p>The Samsung “Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span class="inserted"><ins><em>risk of
an outage (which is what
+ just happened).</p>
+
+ <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>internet to another
+ company, Nuance</a>. Nuance</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you</em></ins></span>
can <span class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>do</em></ins></span> it <span
class="removed"><del><strong>and would then have</strong></del></span>
+ <span class="inserted"><ins><em>using controls right on the
thermostat.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The fact
that</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the
- <span class="removed"><del><strong>transmission
reports</strong></del></span> <span class="inserted"><ins><em>security of an
Amazon device,
+ <p>Crackers found a way</em></ins></span> to
+ <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into</em></ins></span> a <span class="removed"><del><strong>404
error really means nothing;</strong></del></span> <span
class="inserted"><ins><em>listening device</a> for them.</p>
+ turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>server
- could save</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>data anyway.)</p>
+ <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the US
+ <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span>
or <span class="removed"><del><strong>some other government.</p>
+ <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>cease</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done
+ by free software in your own computer.</p>
+ </li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span
class="inserted"><ins><em>sell</em></ins></span> the <span
class="removed"><del><strong>switch to turn this off has no effect. (The
fact</strong></del></span> <span class="inserted"><ins><em>product
in</em></ins></span> that <span class="inserted"><ins><em>country,
+ do you think Amazon would have</em></ins></span> the
+ <span class="removed"><del><strong>transmission reports a 404 error
really means nothing; the server
+ could save that data anyway.)</p>
- <p>Even worse, it</strong></del></span> <span
class="inserted"><ins><em>country,
- do you think Amazon would have the moral fiber to say no?</p>
+ <p>Even worse, it</strong></del></span> <span
class="inserted"><ins><em>moral fiber to say no?</p>
<p>These crackers are probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
@@ -2652,7 +2654,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 07:58:15 $
+$Date: 2018/10/01 09:59:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary-surveillance.ja.po 1 Oct 2018 07:58:15 -0000 1.216
+++ proprietary-surveillance.ja.po 1 Oct 2018 09:59:22 -0000 1.217
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -2814,9 +2814,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary-surveillance.pot 1 Oct 2018 07:58:15 -0000 1.165
+++ proprietary-surveillance.pot 1 Oct 2018 09:59:22 -0000 1.166
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2019,8 +2019,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a "
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a "
"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\">
"
"surveillance, and danger of sabotage</a> (of a specific user, or of all "
"users at once), as well as the risk of an outage (which is what just "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.402
retrieving revision 1.403
diff -u -b -r1.402 -r1.403
--- proprietary-surveillance.ru.po 1 Oct 2018 07:58:15 -0000 1.402
+++ proprietary-surveillance.ru.po 1 Oct 2018 09:59:22 -0000 1.403
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-09-30 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -2890,9 +2890,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-tethers.de.po 1 Oct 2018 08:28:39 -0000 1.23
+++ proprietary-tethers.de.po 1 Oct 2018 09:59:22 -0000 1.24
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -74,9 +74,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-tethers.fr.po 1 Oct 2018 08:28:39 -0000 1.39
+++ proprietary-tethers.fr.po 1 Oct 2018 09:59:22 -0000 1.40
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-09-28 08:52+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -74,9 +74,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-tethers.ja-diff.html 1 Oct 2018 08:28:39 -0000 1.13
+++ proprietary-tethers.ja-diff.html 1 Oct 2018 09:59:22 -0000 1.14
@@ -46,7 +46,7 @@
<ul class="blurbs">
<li id="M201809260">
- <p>Honeywell's "smart" thermostats communicate
+ <p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
all the nasty characteristics of such devices: <a
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
@@ -242,7 +242,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/01 08:28:39 $
+$Date: 2018/10/01 09:59:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-tethers.ja.po 1 Oct 2018 08:28:39 -0000 1.20
+++ proprietary-tethers.ja.po 1 Oct 2018 09:59:22 -0000 1.21
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -66,9 +66,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."
Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-tethers.pot 1 Oct 2018 08:28:39 -0000 1.20
+++ proprietary-tethers.pot 1 Oct 2018 09:59:22 -0000 1.21
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -58,8 +58,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a "
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a "
"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\">
"
"surveillance, and danger of sabotage</a> (of a specific user, or of all "
"users at once), as well as the risk of an outage (which is what just "
Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-tethers.ru.po 1 Oct 2018 08:28:39 -0000 1.44
+++ proprietary-tethers.ru.po 1 Oct 2018 09:59:22 -0000 1.45
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
"PO-Revision-Date: 2018-09-27 09:13+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -74,9 +74,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+"Honeywell's “smart” thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
"user, or of all users at once), as well as the risk of an outage (which is "
"what just happened)."