[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-adobe.fr.html malware-a...
From: |
GNUN |
Subject: |
www/proprietary malware-adobe.fr.html malware-a... |
Date: |
Wed, 17 Oct 2018 06:01:41 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/17 06:01:37
Modified files:
proprietary : malware-adobe.fr.html malware-adobe.ru.html
malware-amazon.es.html malware-amazon.fr.html
malware-amazon.ru.html malware-apple.es.html
malware-apple.fr.html malware-apple.ru.html
malware-appliances.fr.html
malware-appliances.ru.html malware-cars.fr.html
malware-cars.ru.html malware-games.fr.html
malware-games.ru.html malware-google.fr.html
malware-google.ru.html
malware-microsoft.fr.html
malware-microsoft.ru.html
malware-mobiles.fr.html malware-mobiles.ru.html
malware-webpages.fr.html
malware-webpages.ru.html
potential-malware.de.html
potential-malware.fr.html
potential-malware.ru.html
proprietary-back-doors.fr.html
proprietary-back-doors.ru.html
proprietary-censorship.de.html
proprietary-censorship.es.html
proprietary-censorship.fr.html
proprietary-censorship.ru.html
proprietary-coverups.de.html
proprietary-coverups.fr.html
proprietary-coverups.ru.html
proprietary-deception.fr.html
proprietary-deception.ru.html
proprietary-drm.fr.html proprietary-drm.ru.html
proprietary-incompatibility.fr.html
proprietary-incompatibility.ru.html
proprietary-insecurity.fr.html
proprietary-insecurity.ru.html
proprietary-interference.fr.html
proprietary-interference.ru.html
proprietary-jails.fr.html
proprietary-jails.ru.html
proprietary-sabotage.fr.html
proprietary-sabotage.ru.html
proprietary-subscriptions.fr.html
proprietary-subscriptions.ru.html
proprietary-surveillance.fr.html
proprietary-surveillance.ru.html
proprietary-tethers.fr.html
proprietary-tethers.ru.html
proprietary-tyrants.fr.html
proprietary-tyrants.ru.html proprietary.fr.html
proprietary.pt-br.html proprietary.ru.html
proprietary/po : malware-adobe.de-diff.html
malware-adobe.fr-en.html
malware-adobe.ja-diff.html
malware-adobe.ru-en.html
malware-amazon.es-en.html
malware-amazon.fr-en.html
malware-amazon.it-diff.html
malware-amazon.ja-diff.html
malware-amazon.ru-en.html
malware-apple.de-diff.html
malware-apple.es-en.html
malware-apple.fr-en.html
malware-apple.it-diff.html
malware-apple.ja-diff.html
malware-apple.nl-diff.html
malware-apple.ru-en.html
malware-appliances.de-diff.html
malware-appliances.fr-en.html
malware-appliances.ru-en.html
malware-cars.de-diff.html
malware-cars.fr-en.html malware-cars.ru-en.html
malware-games.fr-en.html
malware-games.ja-diff.html
malware-games.ru-en.html
malware-google.fr-en.html
malware-google.ru-en.html
malware-microsoft.de-diff.html
malware-microsoft.fr-en.html
malware-microsoft.it-diff.html
malware-microsoft.ja-diff.html
malware-microsoft.ru-en.html
malware-mobiles.de-diff.html
malware-mobiles.fr-en.html
malware-mobiles.it-diff.html
malware-mobiles.ja-diff.html
malware-mobiles.ru-en.html
malware-webpages.de-diff.html
malware-webpages.fr-en.html
malware-webpages.ru-en.html
potential-malware.de-en.html
potential-malware.fr-en.html
potential-malware.ru-en.html
proprietary-back-doors.fr-en.html
proprietary-back-doors.it-diff.html
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ru-en.html
proprietary-censorship.de-en.html
proprietary-censorship.es-en.html
proprietary-censorship.fr-en.html
proprietary-censorship.it-diff.html
proprietary-censorship.ja-diff.html
proprietary-censorship.ru-en.html
proprietary-coverups.de-en.html
proprietary-coverups.fr-en.html
proprietary-coverups.ja-diff.html
proprietary-coverups.ru-en.html
proprietary-deception.fr-en.html
proprietary-deception.ja-diff.html
proprietary-deception.ru-en.html
proprietary-drm.fr-en.html
proprietary-drm.it-diff.html
proprietary-drm.ja-diff.html
proprietary-drm.ru-en.html
proprietary-incompatibility.fr-en.html
proprietary-incompatibility.ru-en.html
proprietary-insecurity.fr-en.html
proprietary-insecurity.it-diff.html
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ru-en.html
proprietary-interference.fr-en.html
proprietary-interference.ja-diff.html
proprietary-interference.ru-en.html
proprietary-jails.fr-en.html
proprietary-jails.it-diff.html
proprietary-jails.ja-diff.html
proprietary-jails.ru-en.html
proprietary-sabotage.fr-en.html
proprietary-sabotage.it-diff.html
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ru-en.html
proprietary-subscriptions.fr-en.html
proprietary-subscriptions.ja-diff.html
proprietary-subscriptions.ru-en.html
proprietary-surveillance.fr-en.html
proprietary-surveillance.it-diff.html
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ru-en.html
proprietary-tethers.fr-en.html
proprietary-tethers.ja-diff.html
proprietary-tethers.ru-en.html
proprietary-tyrants.fr-en.html
proprietary-tyrants.it-diff.html
proprietary-tyrants.ja-diff.html
proprietary-tyrants.ru-en.html
proprietary.fr-en.html proprietary.it-diff.html
proprietary.ja-diff.html
proprietary.nl-diff.html
proprietary.pl-diff.html
proprietary.pt-br-en.html
proprietary.ru-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-adobe.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-adobe.ru.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.fr.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.ru.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.fr.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.ru.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.fr.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ru.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.fr.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.de.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.fr.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.ru.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.de.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.es.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.fr.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.ru.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.de.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.fr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.fr.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.fr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.fr.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.ru.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.fr.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.ru.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.ru.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.fr.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.ru.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.fr.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.fr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.ru.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.pt-br.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.de-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.fr-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.ja-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.ru-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.ru-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.de-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.es-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.de-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.fr-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ja-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ru-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.fr-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.ru-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.fr-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru-en.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru-en.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ja-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.29&r2=1.30
Patches:
Index: malware-adobe.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-adobe.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-adobe.fr.html 9 Oct 2018 13:30:39 -0000 1.11
+++ malware-adobe.fr.html 17 Oct 2018 10:01:33 -0000 1.12
@@ -47,12 +47,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
<ul class="blurbs">
-
- <!-- INSERT adobe -->
-<li id="M201701110">
+ <li id="M201701110">
<p>Un logiciel de mise à jour pour Acrobat Reader <a
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">modifie
Chrome sans prévenir</a>.</p>
@@ -185,7 +183,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-adobe.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-adobe.ru.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-adobe.ru.html 9 Oct 2018 13:30:39 -0000 1.10
+++ malware-adobe.ru.html 17 Oct 2018 10:01:33 -0000 1.11
@@ -46,12 +46,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
<ul class="blurbs">
-
- <!-- INSERT adobe -->
-<li id="M201701110">
+ <li id="M201701110">
<p>Ðбновление пакеÑа Acrobat Reader <a
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">вÑиÑ
ÑÑ
подменÑÐµÑ Chrome</a>.</p>
@@ -186,7 +184,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-amazon.es.html 12 Oct 2018 07:58:36 -0000 1.12
+++ malware-amazon.es.html 17 Oct 2018 10:01:33 -0000 1.13
@@ -62,9 +62,7 @@
<h4 id="back-doors">Puertas traseras</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-back-door -->
-<li id="M201503210">
+ <li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">hizo
una actualización regresiva en el software de los dispositivos Swindle de
@@ -97,9 +95,7 @@
<h4 id="surveillance">Vigilancia</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-surv -->
-<li id="M201212031">
+ <li id="M201212031">
<p>La <cite>Electronic Frontier Foundation</cite> ha examinado y
encontrado <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">diversos tipos de
vigilancia en el Swindle y otros lectores de libros electrónicos</a>.</p>
@@ -110,9 +106,7 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-dr -->
-<li id="M201704131">
+ <li id="M201704131">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html"> El
Kindle
de Amazon tiene DRM</a>. Ese artÃculo es erróneo, ya que no trata el DRM
como una cuestión ética; da por hecho que todo lo que Amazon podrÃa hacer a
@@ -129,9 +123,7 @@
<h4 id="echo-back-doors">Puertas traseras</h4>
<ul class="blurbs">
-
- <!-- INSERT echo-back-door -->
-<li id="M201606060">
+ <li id="M201606060">
<p>El Amazon Echo parece tener una puerta trasera universal, ya que <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"> instala
«actualizaciones» automáticamente</a>.</p>
@@ -147,9 +139,7 @@
<h4 id="echo-surveillance">Vigilancia</h4>
<ul class="blurbs">
-
- <!-- INSERT echo-surv -->
-<li id="M201808120">
+ <li id="M201808120">
<p>Unos <cite>crackers</cite> encontraron la manera de sortear las medidas
de
seguridad de un dispositivo de Amazon y <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"> convertirlo
@@ -172,9 +162,7 @@
<h3 id="misc"> <cite>Malware</cite> en otros productos</h3>
<ul class="blurbs">
-
- <!-- INSERT amazon-misc -->
-<li id="M201711200">
+ <li id="M201711200">
<p>Recientemente Amazon embaucó a los consumidores para que <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">permitieran
a su personal que abriera la puerta de entrada al sistema</a>. Por si no lo
@@ -264,7 +252,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-amazon.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.fr.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-amazon.fr.html 12 Oct 2018 07:58:36 -0000 1.14
+++ malware-amazon.fr.html 17 Oct 2018 10:01:33 -0000 1.15
@@ -60,9 +60,7 @@
<h4 id="back-doors">Portes dérobées</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-back-door -->
-<li id="M201503210">
+ <li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
a fait une mise à jour régressive du logiciel installé dans les Swindles des
@@ -95,9 +93,7 @@
<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-surv -->
-<li id="M201212031">
+ <li id="M201212031">
<p>L'<cite>Electronic Frontier Foundation</cite> a mis en évidence <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">différents
mécanismes de surveillance dans le Swindle et autres liseuses</a>.</p>
@@ -108,9 +104,7 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-dr -->
-<li id="M201704131">
+ <li id="M201704131">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">Le
Kindle
d'Amazon a des menottes numériques</a>. Cet article a un défaut : il
néglige
la dimension éthique des DRM ; il prend pour acquis que tout ce qu'Amazon
@@ -127,9 +121,7 @@
<h4 id="echo-back-doors">Portes dérobées</h4>
<ul class="blurbs">
-
- <!-- INSERT echo-back-door -->
-<li id="M201606060">
+ <li id="M201606060">
<p>L'Echo d'Amazon semble avoir une porte dérobée universelle puisque <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">les
« mises à jour » s'installent automatiquement</a>.</p>
@@ -144,9 +136,7 @@
<h4 id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
-
- <!-- INSERT echo-surv -->
-<li id="M201808120">
+ <li id="M201808120">
<p>Des crackers ont trouvé moyen de contourner les dispositifs de
sécurité d'un
appareil d'Amazon et de <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">le transformer
@@ -168,9 +158,7 @@
<h3 id="misc"> Malveillance d'autres produits</h3>
<ul class="blurbs">
-
- <!-- INSERT amazon-misc -->
-<li id="M201711200">
+ <li id="M201711200">
<p>Amazon a récemment invité ses clients à se faire pigeonner en <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">permettant
aux livreurs d'ouvrir leurs portes d'entrée</a>. Et vous savez quoi ? Le
@@ -262,7 +250,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-amazon.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.ru.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-amazon.ru.html 12 Oct 2018 07:58:36 -0000 1.13
+++ malware-amazon.ru.html 17 Oct 2018 10:01:33 -0000 1.14
@@ -60,9 +60,7 @@
<h4 id="back-doors">Ðазейки</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-back-door -->
-<li id="M201503210">
+ <li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
оÑкаÑила назад пÑогÑÐ°Ð¼Ð¼Ñ Ð² Kindle
полÑзоваÑелей</a> Ñак, ÑÑо ÑÑÑÑойÑÑва, в
@@ -94,9 +92,7 @@
<h4 id="surveillance">Слежка</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-surv -->
-<li id="M201212031">
+ <li id="M201212031">
<p>Фонд ÑлекÑÑоннÑÑ
ÑÑбежей обÑледовал и
наÑел <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> Ñазного
Ñода
ÑÐ»ÐµÐ¶ÐºÑ Ð² Swindle и дÑÑгиÑ
ÑÑÑÑойÑÑваÑ
ÑÑениÑ
ÑлекÑÑоннÑÑ
книг</a>.</p>
@@ -107,9 +103,7 @@
<h4 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h4>
<ul class="blurbs">
-
- <!-- INSERT swindle-dr -->
-<li id="M201704131">
+ <li id="M201704131">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html"> Ð
Amazon
Kindle еÑÑÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми</a>. ÐедоÑÑаÑок ÑÑой
ÑÑаÑÑи — в Ñом, ÑÑо ÑиÑÑовое
ÑпÑавление огÑаниÑениÑми не
@@ -129,9 +123,7 @@
<h4 id="echo-back-doors">Ðазейки</h4>
<ul class="blurbs">
-
- <!-- INSERT echo-back-door -->
-<li id="M201606060">
+ <li id="M201606060">
<p>ÐказÑваеÑÑÑ, ÑÑо в Amazon Echo еÑÑÑ
ÑнивеÑÑалÑÐ½Ð°Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°, поÑколÑÐºÑ <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
“обновлениє Ñам ÑÑÑанавливаÑÑÑÑ
авÑомаÑиÑеÑки</a>.</p>
@@ -146,9 +138,7 @@
<h4 id="echo-surveillance">Слежка</h4>
<ul class="blurbs">
-
- <!-- INSERT echo-surv -->
-<li id="M201808120">
+ <li id="M201808120">
<p>ÐзломÑики наÑли ÑпоÑоб пÑобиÑÑ Ð·Ð°ÑиÑÑ
ÑÑÑÑойÑÑва Amazon и <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
пÑевÑаÑиÑÑ
его в ÑÑÑÑойÑÑво, подÑлÑÑиваÑÑее</a> Ð´Ð»Ñ Ð½Ð¸Ñ
.</p>
@@ -169,9 +159,7 @@
<h3 id="misc"> ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² пÑодÑкÑаÑ
</h3>
<ul class="blurbs">
-
- <!-- INSERT amazon-misc -->
-<li id="M201711200">
+ <li id="M201711200">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Amazon недавно пÑиглаÑила
поÑÑебиÑелей бÑÑÑ Ð¿ÑоÑÑоÑилÑми и <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
позволиÑÑ ÑоÑÑÑдникам ÑлÑжб доÑÑавки
оÑкÑÑваÑÑ Ð¸Ñ
вÑ
однÑе двеÑи</a>. ÐÐ¾Ñ Ð²Ð°Ð¼
@@ -262,7 +250,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-apple.es.html 10 Oct 2018 11:57:41 -0000 1.58
+++ malware-apple.es.html 17 Oct 2018 10:01:33 -0000 1.59
@@ -81,9 +81,7 @@
<h3 id="back-doors">Puertas traseras de Apple</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-back-door -->
-<li id="M201607284">
+ <li id="M201607284">
<p>La aplicación Dropbox para Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
toma el control, de los elementos presentes en la interfaz de usuario una
@@ -123,9 +121,7 @@
<h3 id="deception">Trampas de Apple</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-decept -->
-<li id="M201308290">
+ <li id="M201308290">
<p>«<cite>Dark patterns</cite>» se refiere a <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">interfaces
de usuario que están diseñadas para engañar a los usuarios o hacer que sea
@@ -140,9 +136,7 @@
<h3 id="drm">Gestión digital de restricciones en Apple</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-dr -->
-<li id="M201704071">
+ <li id="M201704071">
<p>El DRM hace que el iPhone 7 sea prácticamente <a
href="#iphone7-sabotage">irreparable</a> por nadie que no sea Apple.</p>
</li>
@@ -187,9 +181,7 @@
ejecuta el software.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-incompat -->
-<li id="M201803300">
+ <li id="M201803300">
<p>En MacOS e iOS, el procedimiento para <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">convertir
imágenes del formato Photos</a> a un formato libre es tan tedioso y lleva
@@ -228,9 +220,7 @@
que el software privativo de prestigio está libre de graves fallos.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-insec -->
-<li id="M201607220">
+ <li id="M201607220">
<p>Una vulnerabilidad en la interfaz de programación (API) <cite>Image
I/O</cite> de Apple permitÃa a un atacante <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">ejecutar
@@ -288,9 +278,7 @@
<h4>Ejemplos de censura por prisiones de Apple</h4>
<ul class="blurbs">
-
- <!-- INSERT apple-jail -->
-<li id="M201710130">
+ <li id="M201710130">
<p>Apple está <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
censurando aplicaciones también a petición del Gobierno de
@@ -404,9 +392,7 @@
venta agresiva y otras tácticas comerciales injustas de Apple. </p>
<ul class="blurbs">
-
- <!-- INSERT apple-press -->
-<li id="M201510270">
+ <li id="M201510270">
<p>La aplicación Siri de Apple <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">rechaza
ofrecerle información</a> sobre listas musicales si usted no está suscrito a
@@ -421,9 +407,7 @@
para intervenir directamente de maneras que los dañan u obstruyen su
labor.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-sab -->
-<li id="M201805310">
+ <li id="M201805310">
<p>Apple ha <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">bloqueado
las actualizaciones de su aplicación de Telegram durante un mes</a>.</p>
@@ -517,9 +501,7 @@
<h3 id="surveillance">Vigilancia de Apple</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-surv -->
-<li id="M201809070">
+ <li id="M201809070">
<p>Adware Doctor, un bloqueador de anuncios para MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">recoge
y transmite el historial de navegación del usuario</a>.</p>
@@ -702,9 +684,7 @@
<h3 id="tyrants">Tiranos de Apple</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-tyrant -->
-<li id="M201412010">
+ <li id="M201412010">
<p>Apple <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">bloquea
arbitrariamente a los usuarios impidiéndoles que instalen versiones antiguas
@@ -796,7 +776,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2018/10/10 11:57:41 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-apple.fr.html 9 Oct 2018 13:30:39 -0000 1.63
+++ malware-apple.fr.html 17 Oct 2018 10:01:33 -0000 1.64
@@ -78,9 +78,7 @@
<h3 id="back-doors">Portes dérobées</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-back-door -->
-<li id="M201607284">
+ <li id="M201607284">
<p>L'appli Dropbox pour MacIntosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">prend
le contrôle des éléments de l'interface utilisateur après avoir piégé ce
@@ -121,9 +119,7 @@
<h3 id="deception">Pratiques trompeuses</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-decept -->
-<li id="M201308290">
+ <li id="M201308290">
<p>Les <cite>Dark Patterns</cite> sont <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">des
interfaces web conçues pour piéger les utilisateurs ou rendre certains
@@ -139,9 +135,7 @@
<h3 id="drm">DRM</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-dr -->
-<li id="M201704071">
+ <li id="M201704071">
<p>Un DRM rend l'iPhone7 presque <a
href="#iphone7-sabotage">irréparable</a>
par quelqu'un d'autre qu'Apple.</p>
</li>
@@ -186,9 +180,7 @@
l'appareil sur lequel tourne le logiciel.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-incompat -->
-<li id="M201803300">
+ <li id="M201803300">
<p>Dans MacOS et iOS, la <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">procédure
de conversion d'images au format Photos</a> vers un format libre est si
@@ -227,9 +219,7 @@
que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-insec -->
-<li id="M201607220">
+ <li id="M201607220">
<p>Une vulnérabilité dans l'interface de programmation (API) <cite>Image
I/O</cite> d'Apple permettait à un attaquant <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">
@@ -287,9 +277,7 @@
<h4>Exemples de censure par les prisons d'Apple</h4>
<ul class="blurbs">
-
- <!-- INSERT apple-jail -->
-<li id="M201710130">
+ <li id="M201710130">
<p>Cette société <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">censure
également des applis pour le gouvernement américain</a>. Plus précisément,
@@ -406,9 +394,7 @@
agressives et autres tactiques injustes de la part d'Apple.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-press -->
-<li id="M201510270">
+ <li id="M201510270">
<p>Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuse
de vous donner des renseignements</a> sur la popularité des chansons si vous
@@ -424,9 +410,7 @@
bloque leur travail.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-sab -->
-<li id="M201805310">
+ <li id="M201805310">
<p>Apple a <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">empêché
Telegram de mettre à jour son appli pendant un mois</a>.</p>
@@ -519,9 +503,7 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-surv -->
-<li id="M201809070">
+ <li id="M201809070">
<p>Adware Doctor, un bloqueur de pubs pour MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">envoie
l'historique de navigation de l'utilisateur à sa maison mère</a>. </p>
@@ -706,9 +688,7 @@
<h3 id="tyrants">Tyrans</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-tyrant -->
-<li id="M201412010">
+ <li id="M201412010">
<p>Apple <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">empêche
arbitrairement les utilisateurs de revenir aux anciennes versions
d'iOS</a>.</p>
@@ -801,7 +781,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.ru.html 9 Oct 2018 13:30:39 -0000 1.59
+++ malware-apple.ru.html 17 Oct 2018 10:01:33 -0000 1.60
@@ -75,9 +75,7 @@
<h3 id="back-doors">Ðазейки</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-back-door -->
-<li id="M201607284">
+ <li id="M201607284">
<p>ÐÑиложение Dropbox Ð´Ð»Ñ Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
беÑÐµÑ Ð¿Ð¾Ð´ Ñвой конÑÑÐ¾Ð»Ñ ÑлеменÑÑ
полÑзоваÑелÑÑкого инÑеÑÑейÑа поÑле Ñого,
@@ -117,9 +115,7 @@
<h3 id="deception">Ðбман</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-decept -->
-<li id="M201308290">
+ <li id="M201308290">
<p>“ТемнÑе ÑакÑики” пÑедÑÑавлÑÑÑ <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">ÑлеменÑÑ
инÑеÑÑейÑа полÑзоваÑелÑ,
ÑпÑоекÑиÑованнÑе Ñак, ÑÑÐ¾Ð±Ñ Ð²Ð²Ð¾Ð´Ð¸ÑÑ
полÑзоваÑелей в
@@ -135,9 +131,7 @@
<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-dr -->
-<li id="M201704071">
+ <li id="M201704071">
<p>ЦиÑÑовое ÑпÑавление огÑаниÑение
Ð´ÐµÐ»Ð°ÐµÑ iPhone 7 поÑÑи <a
href="#iphone7-sabotage">неÑемонÑопÑигоднÑм</a> длÑ
вÑеÑ
, кÑоме Apple.</p>
</li>
@@ -182,9 +176,7 @@
коÑоÑÑе могÑÑ Ð¾ÑвободиÑÑ ÑÑÑÑойÑÑво, на
коÑоÑом пÑогÑÐ°Ð¼Ð¼Ñ ÑабоÑаÑÑ.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-incompat -->
-<li id="M201803300">
+ <li id="M201803300">
<p>Ð MacOS и iOS пÑоÑедÑÑа <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
пÑеобÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸Ð·Ð¾Ð±Ñажений из ÑоÑмаÑа
Photos</a> в ÑвободнÑй ÑоÑмаÑ
@@ -223,9 +215,7 @@
пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-insec -->
-<li id="M201607220">
+ <li id="M201607220">
<p>УÑзвимоÑÑÑ Ð² инÑеÑÑейÑе Apple Image I/O
позволила взломÑÐ¸ÐºÑ <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">вÑполнÑÑÑ
вÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· лÑбого
пÑиложениÑ, коÑоÑое полÑзÑеÑÑÑ ÑÑим
@@ -279,9 +269,7 @@
<h4>ÐÑимеÑÑ ÑензÑÑÑ ÑÑедÑÑвами ÑÑÑем Apple</h4>
<ul class="blurbs">
-
- <!-- INSERT apple-jail -->
-<li id="M201710130">
+ <li id="M201710130">
<p>Apple Ñакже <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
подвеÑÐ³Ð°ÐµÑ ÑензÑÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¾Ñганов
СШÐ</a>. Ð ÑаÑÑноÑÑи, компаниÑ
@@ -398,9 +386,7 @@
неÑеÑÑÐ½Ð°Ñ ÐºÐ¾Ð¼Ð¼ÐµÑÑеÑÐºÐ°Ñ ÑакÑика Apple.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-press -->
-<li id="M201510270">
+ <li id="M201510270">
<p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">оÑказÑваеÑÑÑ
вÑдаваÑÑ Ð²Ð°Ð¼ ÑведениÑ</a> о попÑлÑÑноÑÑи
мÑзÑки, еÑли Ð²Ñ Ð½Ðµ подпиÑÐ°Ð½Ñ Ð½Ð°
@@ -416,9 +402,7 @@
ÑабоÑаÑÑ.</p>
<ul class="blurbs">
-
- <!-- INSERT apple-sab -->
-<li id="M201805310">
+ <li id="M201805310">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Apple <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">заблокиÑовала
обновление Telegram на меÑÑÑ</a>.</p>
@@ -511,9 +495,7 @@
<h3 id="surveillance">Слежка</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-surv -->
-<li id="M201809070">
+ <li id="M201809070">
<p>Adware Doctor, блокиÑовÑик ÑÐµÐºÐ»Ð°Ð¼Ñ Ð´Ð»Ñ MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">докладÑваеÑ
об иÑÑоÑии поÑеÑений ÑайÑов
полÑзоваÑелем</a>.</p>
@@ -694,9 +676,7 @@
<h3 id="tyrants">ТиÑанÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT apple-tyrant -->
-<li id="M201412010">
+ <li id="M201412010">
<p>Apple по ÑÐ²Ð¾ÐµÐ¼Ñ Ð¿ÑÐ¾Ð¸Ð·Ð²Ð¾Ð»Ñ <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">блокиÑÑеÑ
ÑÑÑÐ°Ð½Ð¾Ð²ÐºÑ Ð¿Ð¾Ð»ÑзоваÑелÑми ÑÑаÑÑÑ
веÑÑий
iOS</a>.</p>
@@ -788,7 +768,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- malware-appliances.fr.html 9 Oct 2018 13:30:39 -0000 1.47
+++ malware-appliances.fr.html 17 Oct 2018 10:01:33 -0000 1.48
@@ -50,12 +50,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
-
- <!-- INSERT appliances -->
-<li id="M201809260">
+ <li id="M201809260">
<p>Les thermostats « intelligents » d'Honeywell communiquent par
l'intermédiaire du serveur de la société. Ils ont toutes les
caractéristiques de ce genre d'appareil : <a
@@ -840,7 +838,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-appliances.ru.html 9 Oct 2018 13:30:39 -0000 1.43
+++ malware-appliances.ru.html 17 Oct 2018 10:01:33 -0000 1.44
@@ -48,12 +48,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
-
- <!-- INSERT appliances -->
-<li id="M201809260">
+ <li id="M201809260">
<p>“ÐнÑеллекÑÑалÑнÑе” ÑеÑмоÑÑаÑÑ
Honeywell ÑвÑзÑваÑÑÑÑ ÑолÑко Ñ
ÑеÑвеÑом компании. У ниÑ
еÑÑÑ Ð²Ñе ÑквеÑнÑе
ÑеÑÑÑ ÑакиÑ
ÑÑÑÑойÑÑв: <a
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
@@ -828,7 +826,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-cars.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.fr.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-cars.fr.html 9 Oct 2018 13:30:39 -0000 1.9
+++ malware-cars.fr.html 17 Oct 2018 10:01:33 -0000 1.10
@@ -49,12 +49,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
-
- <!-- INSERT cars -->
-<li id="M201711230">
+ <li id="M201711230">
<p>Les applis d'aide à la conduite intégrant de l'intelligence
artificielle
peuvent <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">suivre
@@ -292,7 +290,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-cars.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-cars.ru.html 9 Oct 2018 13:30:39 -0000 1.8
+++ malware-cars.ru.html 17 Oct 2018 10:01:33 -0000 1.9
@@ -48,12 +48,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
-
- <!-- INSERT cars -->
-<li id="M201711230">
+ <li id="M201711230">
<p>ÐÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¸ÑкÑÑÑÑвеннÑм
инÑеллекÑом, огÑаниÑиваÑÑие полÑзование
ÑелеÑоном
во вÑÐµÐ¼Ñ Ð²Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ, могÑÑ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -289,7 +287,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-games.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-games.fr.html 14 Oct 2018 12:58:19 -0000 1.18
+++ malware-games.fr.html 17 Oct 2018 10:01:33 -0000 1.19
@@ -49,12 +49,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
<ul class="blurbs">
-
- <!-- INSERT games -->
-<li id="M201807310">
+ <li id="M201807310">
<p>Un jeu vidéo non libre accessible au moyen du client Steam non libre <a
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">comprenait
un « mineur »</a>, c'est-à -dire un exécutable qui pirate le processeur de
@@ -293,7 +291,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-games.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.ru.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-games.ru.html 14 Oct 2018 09:58:12 -0000 1.15
+++ malware-games.ru.html 17 Oct 2018 10:01:33 -0000 1.16
@@ -48,12 +48,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
<ul class="blurbs">
-
- <!-- INSERT games -->
-<li id="M201807310">
+ <li id="M201807310">
<p>ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð²Ð¸Ð´ÐµÐ¾Ð¸Ð³Ñа, доÑÑÑпнаÑ
ÑеÑез неÑвободнÑй ÐºÐ»Ð¸ÐµÐ½Ñ Steam, <a
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
ÑодеÑжала “майнеÑа”</a>, Ñ.е.
пÑогÑаммÑ, коÑоÑÐ°Ñ Ð·Ð°Ñ
ваÑÑвала
@@ -292,7 +290,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-google.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.fr.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-google.fr.html 9 Oct 2018 13:30:39 -0000 1.27
+++ malware-google.fr.html 17 Oct 2018 10:01:33 -0000 1.28
@@ -75,9 +75,7 @@
<h3 id="back-doors">Portes dérobées</h3>
<ul class="blurbs">
-
- <!-- INSERT google-back-door -->
-<li id="M201809140">
+ <li id="M201809140">
<p>Android a une <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">porte
dérobée permettant de modifier à distance la configuration
@@ -122,9 +120,7 @@
<h3 id="censorship">Censure</h3>
<ul class="blurbs">
-
- <!-- INSERT google-censor -->
-<li id="M201703160">
+ <li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">propose
des logiciels de censure</a>, soi-disant pour que les parents les installent
@@ -166,9 +162,7 @@
<h3 id="drm">DRM</h3>
<ul class="blurbs">
-
- <!-- INSERT google-dr -->
-<li id="M201705150">
+ <li id="M201705150">
<p>Google permet maintenant aux applis Android de détecter si un appareil
a été
« rooté » et <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">de
@@ -208,9 +202,7 @@
que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
<ul class="blurbs">
-
- <!-- INSERT google-insec -->
-<li id="M201311120">
+ <li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">La
NSA peut aller chercher des données dans les smartphones, que ce soit les
@@ -234,9 +226,7 @@
font du tort aux utilisateurs de certains programmes de Google.</p>
<ul class="blurbs">
-
- <!-- INSERT google-sab -->
-<li id="M201605150">
+ <li id="M201605150">
<p>Revolv est un appareil de l'Internet des objets qui gérait les «Â
maisons
intelligentes » : éclairage, détecteurs de mouvements, régulation de
température, etc. Le 15 mai 2016, Google a annoncé qu'il supprimerait le
@@ -275,9 +265,7 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
-
- <!-- INSERT google-surv -->
-<li id="M201808030">
+ <li id="M201808030">
<p>Certaines applis Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">enregistrent
la position de l'utilisateur même quand il désactive la
géolocalisation</a>.</p>
@@ -399,9 +387,7 @@
<h3 id="tyrants">Tyrans</h3>
<ul class="blurbs">
-
- <!-- INSERT google-tyrant -->
-<li id="M201304080">
+ <li id="M201304080">
<p>Motorola, lorsqu'elle était une filiale de Google, a fabriqué <a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">des
téléphones Android qui sont des tyrans</a> (bien que quelqu'un ait trouvé
@@ -486,7 +472,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-google.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-google.ru.html 9 Oct 2018 13:30:39 -0000 1.25
+++ malware-google.ru.html 17 Oct 2018 10:01:33 -0000 1.26
@@ -73,9 +73,7 @@
<h3 id="back-doors">Ðазейки</h3>
<ul class="blurbs">
-
- <!-- INSERT google-back-door -->
-<li id="M201809140">
+ <li id="M201809140">
<p>Ð ÑиÑÑеме Android еÑÑÑ <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
лазейка Ð´Ð»Ñ Ñдаленного Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð½Ð°ÑÑÑоек
“полÑзоваÑелє</a>.</p>
@@ -116,9 +114,7 @@
<h3 id="censorship">ЦензÑÑа</h3>
<ul class="blurbs">
-
- <!-- INSERT google-censor -->
-<li id="M201703160">
+ <li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð´Ð»Ñ ÑензÑÑÑ</a>, ÑкобÑ
Ð´Ð»Ñ ÑодиÑелей, коÑоÑÑе
@@ -159,9 +155,7 @@
<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
<ul class="blurbs">
-
- <!-- INSERT google-dr -->
-<li id="M201705150">
+ <li id="M201705150">
<p>ТепеÑÑ Google позволÑÐµÑ Ð¿ÑиложениÑм Android
обнаÑÑживаÑÑ, ÑÑо полÑзоваÑелÑ
полÑÑил пÑава админиÑÑÑаÑоÑа, и <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">оÑказÑваÑÑÑÑ
@@ -204,9 +198,7 @@
пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок.</p>
<ul class="blurbs">
-
- <!-- INSERT google-insec -->
-<li id="M201311120">
+ <li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
ÐÐÐ Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°Ð³Ð»ÑдÑваÑÑ Ð² даннÑе на
ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android
@@ -229,9 +221,7 @@
конкÑеÑнÑÑ
пÑогÑамм Google.</p>
<ul class="blurbs">
-
- <!-- INSERT google-sab -->
-<li id="M201605150">
+ <li id="M201605150">
<p>Revolv — ÑÑÑÑойÑÑво ÐнÑеÑнеÑа веÑей,
коÑоÑое ÑпÑавлÑло опеÑаÑиÑми
“ÑмнÑÑ
домов”: вклÑÑением ÑвеÑа,
даÑÑиками движениÑ,
ÑегÑлиÑовкой ÑемпеÑаÑÑÑÑ Ð¸ Ñ.д. Ðа 15 маÑ
2016 года Google обÑÑвил, ÑÑо
@@ -268,9 +258,7 @@
<h3 id="surveillance">Слежка</h3>
<ul class="blurbs">
-
- <!-- INSERT google-surv -->
-<li id="M201808030">
+ <li id="M201808030">
<p>ÐекоÑоÑÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Google в ÑиÑÑеме
Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
запиÑÑваÑÑ Ð¼ÐµÑÑоположение полÑзоваÑелÑ,
даже когда полÑзоваÑели оÑклÑÑаÑÑ
@@ -392,9 +380,7 @@
<h3 id="tyrants">ТиÑанÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT google-tyrant -->
-<li id="M201304080">
+ <li id="M201304080">
<p>Motorola, когда она пÑинадлежала Google,
вÑпÑÑÑила <a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
ÑелеÑÐ¾Ð½Ñ Ñ Android, коÑоÑÑе
ÑвлÑÑÑÑÑÑиÑанами</a> (Ñ
оÑÑ ÐºÑо-Ñо наÑел
ÑпоÑоб
@@ -480,7 +466,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-microsoft.fr.html 10 Oct 2018 10:57:51 -0000 1.64
+++ malware-microsoft.fr.html 17 Oct 2018 10:01:33 -0000 1.65
@@ -75,9 +75,7 @@
<h3 id="back-doors">Portes dérobées</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-back-door -->
-<li id="M201608172">
+ <li id="M201608172">
<p id="windows-update">Microsoft Windows a une porte dérobée universelle
qui permet <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">d'imposer
un changement aux utilisateurs, quel qu'il soit</a>.</p>
@@ -134,9 +132,7 @@
<h3 id="drm">DRM</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-dr -->
-<li id="M200708131">
+ <li id="M200708131">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">Un DRM
dans
Windows</a>, introduit pour répondre aux besoins des disques <a
href="/proprietary/proprietary-drm.html#bluray">Blu-ray</a>. (L'article
@@ -154,9 +150,7 @@
que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
<ul class="blurbs">
-
- <!-- INSERT microsoft-insec -->
-<li id="M201705120">
+ <li id="M201705120">
<p>Des exploits utilisant certains bogues de Windows, développés par la
NSA
puis divulgués par le groupe Shadowbrokers, servent maintenant à <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attaquer
@@ -190,9 +184,7 @@
Microsoft est responsable.</p>
<ul class="blurbs">
-
- <!-- INSERT microsoft-interf -->
-<li id="M201809120">
+ <li id="M201809120">
<p>Une des versions de Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">sermonne
les utilisateurs s'ils essaient d'installer Firefox (ou Chrome)</a>.</p>
@@ -275,9 +267,7 @@
font du tort aux utilisateurs de logiciels Microsoft particuliers.</p>
<ul class="blurbs">
-
- <!-- INSERT microsoft-sab -->
-<li id="M201704194">
+ <li id="M201704194">
<p>Microsoft a fait en sorte que Windows 7 et 8 ne fonctionnent plus sur
certains nouveaux ordinateurs, <a
href="https://support.microsoft.com/fr-fr/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">ce
@@ -366,9 +356,7 @@
<h3 id="subscriptions">Abonnements</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-subscript -->
-<li id="M201507150">
+ <li id="M201507150">
<p>Microsoft Office force ses utilisateurs <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">Ã
s'abonner à Office 365 pour pouvoir créer ou éditer des documents</a>.</p>
@@ -379,9 +367,7 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-surv -->
-<li id="M201710134">
+ <li id="M201710134">
<p>Le programme de télémétrie de Windows 10 envoie à Microsoft des
informations
sur l'ordinateur de l'utilisateur et la manière dont il l'utilise.</p>
@@ -531,9 +517,7 @@
<h3 id="jails">Prisons</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-jail -->
-<li id="M201706130">
+ <li id="M201706130">
<p>Windows 10â¯S était une prisonâ¯: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">Seuls
les programmes du magasin de Windows pouvaient être installés et
@@ -558,9 +542,7 @@
<h3 id="tyrants">Tyrans</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-tyrant -->
-<li id="M201607150">
+ <li id="M201607150">
<p>Microsoft avait accidentellement laissé aux utilisateurs un moyen
d'installer GNU/Linux sur les tablettes fonctionnant sous Windows RT, mais
désormais <a
@@ -656,7 +638,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/10 10:57:51 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ru.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-microsoft.ru.html 11 Oct 2018 06:59:25 -0000 1.59
+++ malware-microsoft.ru.html 17 Oct 2018 10:01:33 -0000 1.60
@@ -73,9 +73,7 @@
<h3 id="back-doors">Ðазейки</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-back-door -->
-<li id="M201608172">
+ <li id="M201608172">
<p id="windows-update">Ð Microsoft Windows еÑÑÑ
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, по коÑоÑÐ¾Ð¼Ñ <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
полÑзоваÑелÑм можно навÑзÑваÑÑ ÐºÐ°ÐºÐ¸Ðµ
Ñгодно изменениÑ</a>.</p>
@@ -132,9 +130,7 @@
<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-dr -->
-<li id="M200708131">
+ <li id="M200708131">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">ЦиÑÑовое
ÑпÑавление огÑаниÑениÑми в Windows</a> введено
в ÑÐ³Ð¾Ð´Ñ Ð´Ð¸Ñкам <a
href="/proprietary/proprietary-drm.html#bluray"> Bluray</a> (в ÑÑаÑÑе
@@ -151,9 +147,7 @@
пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок.</p>
<ul class="blurbs">
-
- <!-- INSERT microsoft-insec -->
-<li id="M201705120">
+ <li id="M201705120">
<p>ÐÑиÑиÑеÑкие оÑибки в Windows, коÑоÑÑе
накапливалиÑÑ Ð² ÐÐРа заÑем бÑли
ÑазглаÑÐµÐ½Ñ Ð³ÑÑппой Shadowbrokers, ÑепеÑÑ
пÑименÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">заÑажаÑÑ
@@ -186,9 +180,7 @@
непÑавилÑно. Ð ÑÑом Ñазделе опиÑанÑ
пÑимеÑÑ Ð¿Ð¾Ð¼ÐµÑ
Ñо ÑÑоÑÐ¾Ð½Ñ Microsoft.</p>
<ul class="blurbs">
-
- <!-- INSERT microsoft-interf -->
-<li id="M201809120">
+ <li id="M201809120">
<p>Ðдна из веÑÑий Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
ÑаÑÐ¿ÐµÐºÐ°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей, еÑли они
пÑÑаÑÑÑÑ ÑÑÑановиÑÑ Firefox (или
@@ -269,9 +261,7 @@
конкÑеÑнÑÑ
пÑогÑамм Microsoft.</p>
<ul class="blurbs">
-
- <!-- INSERT microsoft-sab -->
-<li id="M201704194">
+ <li id="M201704194">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Microsoft Ñделала Ñак, ÑÑобÑ
Windows 7 и 8 пÑекÑаÑили ÑабоÑаÑÑ
на некоÑоÑÑÑ
новÑÑ
компÑÑÑеÑаÑ
, <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">ÑакÑиÑеÑки
@@ -358,9 +348,7 @@
<h3 id="subscriptions">ÐодпиÑка</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-subscript -->
-<li id="M201507150">
+ <li id="M201507150">
<p>Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">подпиÑÑваÑÑÑÑ
на Office 365, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ
ÑедакÑиÑоваÑÑ Ð´Ð¾ÐºÑменÑÑ</a>.</p>
@@ -371,9 +359,7 @@
<h3 id="surveillance">Слежка</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-surv -->
-<li id="M201710134">
+ <li id="M201710134">
<p>ÐÑогÑамма ÑелемеÑÑии Windows 10 поÑÑÐ»Ð°ÐµÑ Ð²
Microsoft инÑоÑмаÑÐ¸Ñ Ð¾ компÑÑÑеÑе
полÑзоваÑÐµÐ»Ñ Ð¸ о Ñом, как иÑполÑзÑеÑÑÑ
компÑÑÑеÑ.</p>
@@ -524,9 +510,7 @@
<h3 id="jails">ТÑÑÑмÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-jail -->
-<li id="M201706130">
+ <li id="M201706130">
<p>Windows 10 S бÑла ÑÑÑÑмой: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
можно бÑло ÑÑÑановиÑÑ Ð¸ вÑполнÑÑÑ ÑолÑко
пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· Windows
@@ -551,9 +535,7 @@
<h3 id="tyrants">ТиÑанÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft-tyrant -->
-<li id="M201607150">
+ <li id="M201607150">
<p>Microsoft ÑлÑÑайно оÑÑавила полÑзоваÑелÑм
ÑпоÑоб ÑÑÑановиÑÑ GNU/Linux на
планÑеÑаÑ
RT Ñ Windows, но ÑепеÑÑ Ð¾Ð½Ð¸ <a
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">“иÑпÑавили”
@@ -649,7 +631,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/11 06:59:25 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-mobiles.fr.html 9 Oct 2018 13:30:39 -0000 1.45
+++ malware-mobiles.fr.html 17 Oct 2018 10:01:33 -0000 1.46
@@ -66,37 +66,46 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
<ul class="blurbs">
- <li><p>Le réseau téléphonique <a
+ <li id="M201502100">
+ <p>Le réseau téléphonique <a
href="https://ssd.eff.org/en/module/problem-mobile-phones">suit les
mouvements de chaque téléphone</a>.</p>
+
<p>C'est inhérent à la conception du réseau téléphonique : aussi
longtemps que
le téléphone est en communication avec lui, il n'y a aucun moyen d'empêcher
le réseau d'enregistrer sa position. De nombreux pays (y compris les
Ãtats-Unis et l'Union européenne) exigent que le réseau conserve toutes ces
données de localisation pendant des mois ou des années.</p>
</li>
- <li><p id="universal-back-door">Le processeur de communication de chaque
téléphone a une porte dérobée
+
+ <li id="M201311121">
+ <p id="universal-back-door">
+ Le processeur de communication de chaque téléphone a une porte dérobée
universelle qui est <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">souvent
utilisée pour forcer le téléphone à transmettre toutes les conversations
qu'il entend</a>.</p>
+
<p>Cette porte dérobée <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">peut
prendre la forme de bogues qui sont restés non corrigés pendant 20
ans</a>. Le choix de laisser ces failles de sécurité en place est
l'équivalent moral de la création d'une porte dérobée.</p>
+
<p>La porte dérobée est dans le « processeur du modem », dont le
rôle est de
communiquer avec le réseau hertzien. Dans la plupart des téléphones, le
processeur du modem a le contrôle du micro et en général il a aussi la
capacité de réécrire le logiciel du processeur principal.</p>
+
<p>Quelques modèles de téléphone sont spécialement conçus pour que le
processeur du modem ne contrôle pas le micro et par conséquent ne puisse pas
changer le logiciel du processeur principal. Ils ont tout de même une porte
dérobée, mais au moins elle est incapable de transformer le téléphone en
appareil d'écoute.</p>
+
<p>Il semble que la porte dérobée universelle soit également utilisée
pour
forcer les téléphones à <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">transmettre
@@ -141,9 +150,7 @@
</ul>
<ul class="blurbs">
-
- <!-- INSERT mobiles-back-door -->
-<li id="M201609130">
+ <li id="M201609130">
<p>Les téléphones Xiaomi sont livrés avec une <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">porte
dérobée universelle à l'usage de Xiaomi</a> dans le processeur
@@ -186,9 +193,7 @@
<h3 id="drm">DRM</h3>
<ul class="blurbs">
-
- <!-- INSERT mobiles-dr -->
-<li id="M201501030">
+ <li id="M201501030">
<p id="netflix-app-geolocation-drm">L'appli Netflix pour Android <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">force
la connexion à utiliser les DNS de Google</a>. C'est l'une des méthodes
@@ -206,9 +211,7 @@
que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
<ul class="blurbs">
-
- <!-- INSERT mobiles-insec -->
-<li id="M201807100">
+ <li id="M201807100">
<p>Siri, Alexa et tous les autres systèmes de commande vocale peuvent
être
piratés par des programmes qui <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">envoient
@@ -343,9 +346,7 @@
<h3 id="surveillance">Surveillance</h3>
<ul class="blurbs">
-
- <!-- INSERT mobiles-surv -->
-<li id="M201806110">
+ <li id="M201806110">
<p>L'appli pour la retransmission en direct du football espagnol <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">suit
les déplacements de l'utilisateur et écoute via le micro</a>.</p>
@@ -808,9 +809,7 @@
<h3 id="jails">Prisons</h3>
<ul class="blurbs">
-
- <!-- INSERT mobiles-jail -->
-<li id="M201210080">
+ <li id="M201210080">
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Feu
Windows 8 pour « appareils mobiles » était une prison</a> : il
censurait le
@@ -822,9 +821,7 @@
<h3 id="tyrants">Tyrans</h3>
<ul class="blurbs">
-
- <!-- INSERT mobiles-tyrant -->
-<li id="M201110110">
+ <li id="M201110110">
<p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">Les
appareils mobiles utilisant Windows 8 sont des tyrans</a>.</p>
</li>
@@ -909,7 +906,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-mobiles.ru.html 9 Oct 2018 13:30:39 -0000 1.42
+++ malware-mobiles.ru.html 17 Oct 2018 10:01:33 -0000 1.43
@@ -64,35 +64,44 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
<ul class="blurbs">
- <li><p>ТелеÑÐ¾Ð½Ð½Ð°Ñ ÑеÑÑ <a
+ <li id="M201502100">
+ <p>ТелеÑÐ¾Ð½Ð½Ð°Ñ ÑеÑÑ <a
href="https://ssd.eff.org/en/module/problem-mobile-phones">
оÑÑлеживаеÑ
пеÑемеÑÐµÐ½Ð¸Ñ ÐºÐ°Ð¶Ð´Ð¾Ð³Ð¾ ÑелеÑона</a>.</p>
+
<p>ÐÑо заложено в ÑÑ
еме ÑелеÑонной ÑеÑи:
пока ÑелеÑон ÑвÑзÑваеÑÑÑ Ñ ÑеÑÑÑ,
помеÑаÑÑ ÑеÑи запиÑÑваÑÑ ÐµÐ³Ð¾
меÑÑоположение невозможно. Ðногие ÑÑÑанÑ
(в Ñом
ÑиÑле СШРи ÐвÑоÑоÑз) ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ ÑеÑÑ Ñ
Ñанила ÑÑи даннÑе о
меÑÑоположении в ÑеÑение меÑÑÑев или
леÑ.</p>
</li>
- <li><p id="universal-back-door">РкоммÑникаÑионном
пÑоÑеÑÑоÑе поÑÑи лÑбого ÑелеÑона еÑÑÑ
ÑнивеÑÑалÑнÑй
+
+ <li id="M201311121">
+ <p id="universal-back-door">
+ РкоммÑникаÑионном пÑоÑеÑÑоÑе поÑÑи
лÑбого ÑелеÑона еÑÑÑ ÑнивеÑÑалÑнÑй
ÑеÑнÑй Ñ
од, коÑоÑÑй <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
ÑаÑÑо пÑименÑеÑÑÑ, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавиÑÑ
ÑелеÑон пеÑедаваÑÑ Ð²Ñе ÑазговоÑÑ, коÑоÑÑе
он ÑлÑÑиÑ</a>.</p>
+
<p>Ðазейка <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">можеÑ
пÑинимаÑÑ ÑоÑÐ¼Ñ Ð¾Ñибок, коÑоÑÑе оÑÑаÑÑÑÑ
неиÑпÑавленнÑми по 20
леÑ</a>. РеÑение оÑÑавиÑÑ Ð¿ÑоÑеÑ
и в заÑиÑе
незаделаннÑми нÑавÑÑвенно
ÑквиваленÑно напиÑÐ°Ð½Ð¸Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ¸.</p>
+
<p>Ðазейка наÑ
одиÑÑÑ Ð² “модемном
пÑоÑеÑÑоÑе”, коÑоÑÑй оÑвеÑÐ°ÐµÑ Ð·Ð°
ÑвÑÐ·Ñ Ñ ÑадиоÑеÑÑÑ. РболÑÑинÑÑве
ÑелеÑонов модемнÑй пÑоÑеÑÑÐ¾Ñ ÐºÐ¾Ð½ÑÑолиÑÑеÑ
ÑабоÑÑ Ð¼Ð¸ÐºÑоÑона. РболÑÑинÑÑве ÑелеÑонов
он Ð¼Ð¾Ð¶ÐµÑ Ð¿ÐµÑепиÑÑваÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¸
в главном пÑоÑеÑÑоÑе.</p>
+
<p>ÐÑÑÑ Ð¼Ð¾Ð´ÐµÐ»Ð¸ ÑелеÑонов, ÑпеÑиалÑно
ÑпÑоекÑиÑованнÑе, ÑÑÐ¾Ð±Ñ Ð¼Ð¸ÐºÑоÑон не
конÑÑолиÑовалÑÑ Ð¼Ð¾Ð´ÐµÐ¼Ð½Ñм пÑоÑеÑÑоÑом и
ÑÑÐ¾Ð±Ñ Ð¾Ð½ не мог изменÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð²
главном пÑоÑеÑÑоÑе. Ðазейка в ниÑ
еÑÑÑ, но
по кÑайней меÑе Ñ ÐµÐµ помоÑÑÑ
невозможно пÑевÑаÑиÑÑ ÑелеÑон в
подÑлÑÑиваÑÑее ÑÑÑÑойÑÑво.</p>
+
<p>УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, оÑевидно,
пÑименÑеÑÑÑ Ñакже, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавлÑÑÑ
ÑелеÑÐ¾Ð½Ñ <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
@@ -136,9 +145,7 @@
</ul>
<ul class="blurbs">
-
- <!-- INSERT mobiles-back-door -->
-<li id="M201609130">
+ <li id="M201609130">
<p>ТелеÑÐ¾Ð½Ñ Xiaomi поÑÑавлÑÑÑÑÑ Ñ <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">ÑнивеÑÑалÑнÑм
ÑеÑнÑм Ñ
одом Ð´Ð»Ñ Ð¿Ð¾Ð»ÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Xiaomi в
пÑоÑеÑÑоÑе Ð´Ð»Ñ Ð¿Ñиложений</a>.</p>
@@ -180,9 +187,7 @@
<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
<ul class="blurbs">
-
- <!-- INSERT mobiles-dr -->
-<li id="M201501030">
+ <li id="M201501030">
<p id="netflix-app-geolocation-drm">ÐÑиложение Android Netflix <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
пÑинÑдиÑелÑно иÑполÑзÑÐµÑ Google DNS</a>. ÐÑо
один из меÑодов, пÑименÑемÑÑ
@@ -199,9 +204,7 @@
пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок.</p>
<ul class="blurbs">
-
- <!-- INSERT mobiles-insec -->
-<li id="M201807100">
+ <li id="M201807100">
<p>Siri, Alexa и вÑе дÑÑгие ÑиÑÑÐµÐ¼Ñ Ð³Ð¾Ð»Ð¾Ñового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">взÑÑÑ
под конÑÑÐ¾Ð»Ñ Ð¿ÑогÑаммами, коÑоÑÑе
воÑпÑоизводÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² неÑлÑÑимом лÑдÑми
@@ -330,9 +333,7 @@
<h3 id="surveillance">Слежка</h3>
<ul class="blurbs">
-
- <!-- INSERT mobiles-surv -->
-<li id="M201806110">
+ <li id="M201806110">
<p>ÐÑпанÑкое пÑиложение ÑÑанÑлÑÑий
ÑÑÑбола <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¸
подÑлÑÑÐ¸Ð²Ð°ÐµÑ ÑеÑез микÑоÑон</a>.</p>
@@ -788,9 +789,7 @@
<h3 id="jails">ТÑÑÑмÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT mobiles-jail -->
-<li id="M201210080">
+ <li id="M201210080">
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
”
(более не дейÑÑвÑÑÑаÑ) бÑла
@@ -802,9 +801,7 @@
<h3 id="tyrants">ТиÑанÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT mobiles-tyrant -->
-<li id="M201110110">
+ <li id="M201110110">
<p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
ÐобилÑнÑе ÑÑÑÑойÑÑва Ñ Ð¿ÑедÑÑÑановленной
Windows 8 — ÑиÑанÑ</a>.</p>
</li>
@@ -887,7 +884,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-webpages.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.fr.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-webpages.fr.html 14 Oct 2018 12:58:19 -0000 1.12
+++ malware-webpages.fr.html 17 Oct 2018 10:01:33 -0000 1.13
@@ -54,12 +54,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
-
- <!-- INSERT webpages -->
-<li id="M201807190">
+ <li id="M201807190">
<p>British Airways a utilisé du <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">JavaScript
non libre sur son site web pour donner aux autres compagnies des données
@@ -288,7 +286,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-webpages.ru.html 14 Oct 2018 13:28:27 -0000 1.11
+++ malware-webpages.ru.html 17 Oct 2018 10:01:33 -0000 1.12
@@ -53,12 +53,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
-
- <!-- INSERT webpages -->
-<li id="M201807190">
+ <li id="M201807190">
<p>British Airways полÑзовалиÑÑ Ð½Ð° Ñвоем ÑайÑе <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">неÑвободнÑми
пÑогÑаммами на JavaScript, ÑÑÐ¾Ð±Ñ Ð²ÑдаваÑÑ
пеÑÑоналÑнÑе даннÑе ÑвоиÑ
клиенÑов
@@ -287,7 +285,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/14 13:28:27 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: potential-malware.de.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.de.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- potential-malware.de.html 9 Oct 2018 13:30:40 -0000 1.6
+++ potential-malware.de.html 17 Oct 2018 10:01:33 -0000 1.7
@@ -28,12 +28,10 @@
verwenden wird. Bislang spricht nichts dafür, dass sie bereits genutzt
werden.</p>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
-
- <!-- INSERT potential -->
-<li id="M201712130">
+ <li id="M201712130">
<p>Patentanmeldungen zeigen, dass Google und Amazon daran interessiert
sind <a
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal">âdigitale
Assistentenâ dazu zu bringen Aktivitäten von Menschen zu studieren, um alles
@@ -138,7 +136,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: potential-malware.fr.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.fr.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- potential-malware.fr.html 9 Oct 2018 13:30:40 -0000 1.7
+++ potential-malware.fr.html 17 Oct 2018 10:01:33 -0000 1.8
@@ -24,12 +24,10 @@
dans le futur à des fins malveillantes. Nous n'avons pas la preuve qu'elles
soient déjà employées actuellement.</p>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
-
- <!-- INSERT potential -->
-<li id="M201712130">
+ <li id="M201712130">
<p>Si l'on en juge d'après leurs dépôts de brevets, Google et Amazon
envisagent
de faire des <a
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal">«Â
assistants
@@ -129,7 +127,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: potential-malware.ru.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.ru.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- potential-malware.ru.html 9 Oct 2018 13:30:40 -0000 1.6
+++ potential-malware.ru.html 17 Oct 2018 10:01:33 -0000 1.7
@@ -25,12 +25,10 @@
могли Ð±Ñ Ð¿ÑименÑÑÑ Ð² бÑдÑÑем во ÑелÑÑ
вÑедиÑелÑÑÑва. У Ð½Ð°Ñ Ð½ÐµÑ ÑвидеÑелÑÑÑв,
ÑÑо они Ñже пÑименÑÑÑÑÑ.</p>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
-
- <!-- INSERT potential -->
-<li id="M201712130">
+ <li id="M201712130">
<p>ÐаÑвки на паÑенÑÑ Ð¿Ð¾ÐºÐ°Ð·ÑваÑÑ, ÑÑо Google и
Amazon заинÑеÑеÑÐ¾Ð²Ð°Ð½Ñ Ð² Ñом,
ÑÑÐ¾Ð±Ñ <a
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal">
@@ -131,7 +129,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-back-doors.fr.html 9 Oct 2018 13:30:40 -0000 1.54
+++ proprietary-back-doors.fr.html 17 Oct 2018 10:01:33 -0000 1.55
@@ -55,9 +55,7 @@
<h3 id='spy'>Espionner</h3>
<ul class="blurbs">
-
- <!-- INSERT spy -->
-<li id="M201706202">
+ <li id="M201706202">
<p id="InternetCameraBackDoor">De nombreux modèles de caméras
connectées contiennent une porte dérobée
caractérisée. Elles ont des comptes utilisateurs avec des mots de passe
codés en dur, non modifiables, et qui <a
@@ -105,9 +103,7 @@
<h3 id='alter-data'>Altérer les données ou préférences de
l'utilisateur</h3>
<ul class="blurbs">
-
- <!-- INSERT alter-data -->
-<li id="M201809140">
+ <li id="M201809140">
<p>Android a une <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">porte
dérobée permettant de modifier à distance la configuration
@@ -215,9 +211,7 @@
<h3 id='install-delete'>Installer ou supprimer des programmes</h3>
<ul class="blurbs">
-
- <!-- INSERT install-delete -->
-<li id="M201804010">
+ <li id="M201804010">
<p>Certains téléviseurs « intelligents » téléchargent
automatiquement des <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">mises
à jour régressives qui installent une appli de surveillance</a>.</p>
@@ -287,9 +281,7 @@
<h3 id='universal'>Contrôle total</h3>
<ul class="blurbs">
-
- <!-- INSERT universal -->
-<li id="M201711244">
+ <li id="M201711244">
<p>Le jouet <cite>Furby Connect</cite> a une <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">porte
dérobée universelle</a>. Même si ce produit, tel qu'il est livré, n'est pas
@@ -409,9 +401,7 @@
<h3 id='other'>Autre ou non défini</h3>
<ul class="blurbs">
-
- <!-- INSERT other -->
-<li id="M201711204">
+ <li id="M201711204">
<p>La porte dérobée intentionnelle du « Moteur de gestion Intel » a
aussi des
<a
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">portes
@@ -558,7 +548,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary-back-doors.ru.html 9 Oct 2018 13:30:40 -0000 1.50
+++ proprietary-back-doors.ru.html 17 Oct 2018 10:01:33 -0000 1.51
@@ -53,9 +53,7 @@
<h3 id='spy'>Шпионаж</h3>
<ul class="blurbs">
-
- <!-- INSERT spy -->
-<li id="M201706202">
+ <li id="M201706202">
<p id="InternetCameraBackDoor">Ðо многиÑ
моделÑÑ
Ð²Ð¸Ð´ÐµÐ¾ÐºÐ°Ð¼ÐµÑ Ñ Ð¿Ð¾Ð´ÐºÐ»ÑÑением к ÐнÑеÑнеÑÑ ÐµÑÑÑ
ÑÑдовиÑнаÑ
лазейка — Ñ Ð½Ð¸Ñ
еÑÑÑ ÑÑеÑÐ½Ð°Ñ Ð·Ð°Ð¿Ð¸ÑÑ Ñ
неизменÑемÑм паÑолем, и <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
@@ -100,9 +98,7 @@
<h3 id='alter-data'>Ðзменение даннÑÑ
или наÑÑÑоек
полÑзоваÑелÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT alter-data -->
-<li id="M201809140">
+ <li id="M201809140">
<p>Ð ÑиÑÑеме Android еÑÑÑ <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
лазейка Ð´Ð»Ñ Ñдаленного Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð½Ð°ÑÑÑоек
“полÑзоваÑелє</a>.</p>
@@ -206,9 +202,7 @@
<h3 id='install-delete'>УÑÑановка или Ñдаление
пÑогÑамм</h3>
<ul class="blurbs">
-
- <!-- INSERT install-delete -->
-<li id="M201804010">
+ <li id="M201804010">
<p>ÐекоÑоÑÑе “инÑеллекÑÑалÑнÑе”
ÑелевизоÑÑ Ð°Ð²ÑомаÑиÑеÑки <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
загÑÑжаÑÑ ÑÑÑаÑениÑ, коÑоÑÑе
ÑÑÑанавливаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ñлежки</a>.</p>
@@ -278,9 +272,7 @@
<h3 id='universal'>ÐолнÑй конÑÑолÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT universal -->
-<li id="M201711244">
+ <li id="M201711244">
<p>Ð Furby Connect еÑÑÑ <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>. ÐÑли пÑодÑÐºÑ Ð²
Ñом виде, в каком он
@@ -399,9 +391,7 @@
<h3 id='other'>ÐÑоÑие и неопÑеделеннÑе</h3>
<ul class="blurbs">
-
- <!-- INSERT other -->
-<li id="M201711204">
+ <li id="M201711204">
<p>РпÑеднамеÑенном ÑеÑном Ñ
оде в
“маÑине ÑпÑавлениє Intel еÑÑÑ
Ñакже <a
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
@@ -547,7 +537,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.de.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-censorship.de.html 12 Oct 2018 07:58:36 -0000 1.22
+++ proprietary-censorship.de.html 17 Oct 2018 10:01:33 -0000 1.23
@@ -55,9 +55,7 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-
- <!-- INSERT google -->
-<li id="M201703160">
+ <li id="M201703160">
<p><a
href="https://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"
title=" Google 'Family Link' gives parents a way to monitor preteens'
@@ -103,9 +101,7 @@
<h3 id="consoles">Spielkonsolen</h3>
<ul class="blurbs">
-
- <!-- INSERT consoles -->
-<li id="M201408290">
+ <li id="M201408290">
<p>Nintendo: <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/"
title="Nintendo's New 3DS Charges 30 Cents to Remove an Internet Browser
@@ -193,7 +189,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.es.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-censorship.es.html 12 Oct 2018 07:58:36 -0000 1.26
+++ proprietary-censorship.es.html 17 Oct 2018 10:01:33 -0000 1.27
@@ -52,9 +52,7 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-
- <!-- INSERT google -->
-<li id="M201703160">
+ <li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
ofrece software de censura</a>, supuestamente para que los padres lo
@@ -94,9 +92,7 @@
<h3 id="consoles">Juegos para consolas</h3>
<ul class="blurbs">
-
- <!-- INSERT consoles -->
-<li id="M201408290">
+ <li id="M201408290">
<p>La consola <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">Nintendo
3DS</a> censura el acceso a Internet. Esta censura se puede inhabilitar,
@@ -180,7 +176,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.fr.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-censorship.fr.html 12 Oct 2018 07:58:36 -0000 1.33
+++ proprietary-censorship.fr.html 17 Oct 2018 10:01:33 -0000 1.34
@@ -53,9 +53,7 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-
- <!-- INSERT google -->
-<li id="M201703160">
+ <li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">propose
des logiciels de censure</a>, soi-disant pour que les parents les installent
@@ -97,9 +95,7 @@
<h3 id="consoles">Consoles de jeu</h3>
<ul class="blurbs">
-
- <!-- INSERT consoles -->
-<li id="M201408290">
+ <li id="M201408290">
<p>La <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">Nintendo
3DS</a> censure la navigation sur le web ; il est possible de désactiver
@@ -184,7 +180,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.ru.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-censorship.ru.html 12 Oct 2018 07:58:36 -0000 1.24
+++ proprietary-censorship.ru.html 17 Oct 2018 10:01:33 -0000 1.25
@@ -52,9 +52,7 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-
- <!-- INSERT google -->
-<li id="M201703160">
+ <li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
пÑÐµÐ´Ð»Ð°Ð³Ð°ÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð´Ð»Ñ ÑензÑÑÑ</a>, ÑкобÑ
Ð´Ð»Ñ ÑодиÑелей, коÑоÑÑе
@@ -95,9 +93,7 @@
<h3 id="consoles">ÐгÑовÑе пÑиÑÑавки</h3>
<ul class="blurbs">
-
- <!-- INSERT consoles -->
-<li id="M201408290">
+ <li id="M201408290">
<p><a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">Nintendo
3DS</a> подвеÑÐ³Ð°ÐµÑ ÑензÑÑе пÑоÑмоÑÑ ÑÑÑаниÑ
ÐнÑеÑнеÑа; ÑензÑÑÑ Ð¼Ð¾Ð¶Ð½Ð¾
@@ -183,7 +179,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-coverups.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.de.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-coverups.de.html 9 Oct 2018 13:30:40 -0000 1.7
+++ proprietary-coverups.de.html 17 Oct 2018 10:01:33 -0000 1.8
@@ -40,12 +40,10 @@
zwei) an, um die Einzelheiten aufzuzeigen.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
<ul class="blurbs">
-
- <!-- INSERT coverups -->
-<li id="M201612120">
+ <li id="M201612120">
<p>Price Waterhouse Coopers versuchte <a
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/"
title="PwC sends 'cease and desist' letters to researchers who found
@@ -132,7 +130,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-coverups.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.fr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-coverups.fr.html 9 Oct 2018 13:30:40 -0000 1.10
+++ proprietary-coverups.fr.html 17 Oct 2018 10:01:33 -0000 1.11
@@ -39,12 +39,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
<ul class="blurbs">
-
- <!-- INSERT coverups -->
-<li id="M201612120">
+ <li id="M201612120">
<p>Price Waterhouse Coopers a essayé d'empêcher que la présence d'une
faille de
sécurité ne s'ébruite en <a
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/">menaçant
@@ -129,7 +127,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-coverups.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-coverups.ru.html 9 Oct 2018 13:30:40 -0000 1.8
+++ proprietary-coverups.ru.html 17 Oct 2018 10:01:33 -0000 1.9
@@ -39,12 +39,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
<ul class="blurbs">
-
- <!-- INSERT coverups -->
-<li id="M201612120">
+ <li id="M201612120">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ PwC пÑÑалаÑÑ Ð·Ð°Ð³Ð»ÑÑиÑÑ Ð·Ð½Ð°Ð½Ð¸Ðµ
об ÑÑзвимоÑÑи, <a
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/">ÑгÑожаÑ
ÑÑдебнÑм пÑеÑледованием аналиÑикам
безопаÑноÑÑи, обнаÑÑживÑим
@@ -129,7 +127,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-deception.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.fr.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-deception.fr.html 9 Oct 2018 13:30:40 -0000 1.19
+++ proprietary-deception.fr.html 17 Oct 2018 10:01:33 -0000 1.20
@@ -38,12 +38,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
-
- <!-- INSERT deception -->
-<li id="M201611060">
+ <li id="M201611060">
<p><a
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">Pour
truander les tests antipollution, Le logiciel privateur d'Audi a employé une
@@ -176,7 +174,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-deception.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-deception.ru.html 9 Oct 2018 13:30:40 -0000 1.18
+++ proprietary-deception.ru.html 17 Oct 2018 10:01:33 -0000 1.19
@@ -38,12 +38,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
-
- <!-- INSERT deception -->
-<li id="M201611060">
+ <li id="M201611060">
<p><a
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
РнеÑвободнÑÑ
пÑогÑаммаÑ
Audi пÑименÑлÑÑ
пÑоÑÑой меÑод обмана ÑеÑÑов
@@ -175,7 +173,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-drm.fr.html 9 Oct 2018 13:30:40 -0000 1.28
+++ proprietary-drm.fr.html 17 Oct 2018 10:01:33 -0000 1.29
@@ -50,12 +50,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
-
- <!-- INSERT drm -->
-<li id="M201806250">
+ <li id="M201806250">
<p>Le jeu <cite>Metal Gear Rising</cite> pour MacOS dépendait d'un
serveur. La
société <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">a
@@ -370,7 +368,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-drm.ru.html 9 Oct 2018 13:30:40 -0000 1.25
+++ proprietary-drm.ru.html 17 Oct 2018 10:01:33 -0000 1.26
@@ -51,12 +51,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
-
- <!-- INSERT drm -->
-<li id="M201806250">
+ <li id="M201806250">
<p>ÐгÑа Metal Gear Rising Ð´Ð»Ñ MacOS пÑивÑзана к
ÑеÑвеÑÑ. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
вÑклÑÑила ÑеÑвеÑ, и вÑе копии пеÑеÑÑали
ÑабоÑаÑÑ</a>.</p>
@@ -376,7 +374,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-incompatibility.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.fr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-incompatibility.fr.html 9 Oct 2018 13:30:40 -0000 1.10
+++ proprietary-incompatibility.fr.html 17 Oct 2018 10:01:33 -0000 1.11
@@ -45,12 +45,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
<ul class="blurbs">
-
- <!-- INSERT incompatibility -->
-<li id="M201803300">
+ <li id="M201803300">
<p>Dans MacOS et iOS, la <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">procédure
de conversion d'images au format Photos</a> vers un format libre est si
@@ -156,7 +154,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-incompatibility.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-incompatibility.ru.html 9 Oct 2018 13:30:40 -0000 1.8
+++ proprietary-incompatibility.ru.html 17 Oct 2018 10:01:33 -0000 1.9
@@ -44,12 +44,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
<ul class="blurbs">
-
- <!-- INSERT incompatibility -->
-<li id="M201803300">
+ <li id="M201803300">
<p>Ð MacOS и iOS пÑоÑедÑÑа <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
пÑеобÑÐ°Ð·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¸Ð·Ð¾Ð±Ñажений из ÑоÑмаÑа
Photos</a> в ÑвободнÑй ÑоÑмаÑ
@@ -157,7 +155,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary-insecurity.fr.html 9 Oct 2018 13:30:40 -0000 1.73
+++ proprietary-insecurity.fr.html 17 Oct 2018 10:01:33 -0000 1.74
@@ -56,12 +56,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
-
- <!-- INSERT insecurity -->
-<li id="M201809240">
+ <li id="M201809240">
<p>Des chercheurs ont découvert un moyen de <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">cacher
des commandes vocales dans d'autres flux audio</a>. Elles sont inaudibles
@@ -672,7 +670,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-insecurity.ru.html 9 Oct 2018 13:30:40 -0000 1.62
+++ proprietary-insecurity.ru.html 17 Oct 2018 10:01:33 -0000 1.63
@@ -56,12 +56,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
-
- <!-- INSERT insecurity -->
-<li id="M201809240">
+ <li id="M201809240">
<p>ÐÑÑледоваÑели оÑкÑÑли ÑпоÑоб <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
ÑкÑÑваÑÑ Ð³Ð¾Ð»Ð¾ÑовÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² дÑÑгиÑ
звÑкозапиÑÑÑ
</a>, Ñак ÑÑо лÑди ÑÑи
@@ -656,7 +654,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-interference.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.fr.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-interference.fr.html 14 Oct 2018 12:58:19 -0000 1.32
+++ proprietary-interference.fr.html 17 Oct 2018 10:01:33 -0000 1.33
@@ -39,12 +39,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
<ul class="blurbs">
-
- <!-- INSERT interference -->
-<li id="M201809120">
+ <li id="M201809120">
<p>Une des versions de Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">sermonne
les utilisateurs s'ils essaient d'installer Firefox (ou Chrome)</a>.</p>
@@ -260,7 +258,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-interference.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.ru.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-interference.ru.html 14 Oct 2018 13:28:27 -0000 1.26
+++ proprietary-interference.ru.html 17 Oct 2018 10:01:33 -0000 1.27
@@ -39,12 +39,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
<ul class="blurbs">
-
- <!-- INSERT interference -->
-<li id="M201809120">
+ <li id="M201809120">
<p>Ðдна из веÑÑий Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
ÑаÑÐ¿ÐµÐºÐ°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей, еÑли они
пÑÑаÑÑÑÑ ÑÑÑановиÑÑ Firefox (или
@@ -257,7 +255,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/14 13:28:27 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-jails.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.fr.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-jails.fr.html 9 Oct 2018 13:30:40 -0000 1.27
+++ proprietary-jails.fr.html 17 Oct 2018 10:01:33 -0000 1.28
@@ -76,9 +76,7 @@
<h4>Exemples de censure par les prisons d'Apple</h4>
<ul class="blurbs">
-
- <!-- INSERT apple -->
-<li id="M201710130">
+ <li id="M201710130">
<p>Cette société <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">censure
également des applis pour le gouvernement américain</a>. Plus précisément,
@@ -190,9 +188,7 @@
<h3 id="microsoft">Prisons de Microsoft</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft -->
-<li id="M201706130">
+ <li id="M201706130">
<p>Windows 10â¯S était une prisonâ¯: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">Seuls
les programmes du magasin de Windows pouvaient être installés et
@@ -297,7 +293,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
<!-- timestamp end -->
</p>
Index: proprietary-jails.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.ru.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-jails.ru.html 9 Oct 2018 13:30:40 -0000 1.24
+++ proprietary-jails.ru.html 17 Oct 2018 10:01:34 -0000 1.25
@@ -75,9 +75,7 @@
<h4>ÐÑимеÑÑ ÑеÑзÑÑÑ Ð² ÑÑÑÑмаÑ
Apple</h4>
<ul class="blurbs">
-
- <!-- INSERT apple -->
-<li id="M201710130">
+ <li id="M201710130">
<p>Apple <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
Ð½Ð°Ð»Ð°Ð³Ð°ÐµÑ ÑензÑÑÑ Ð¸ Ð¾Ñ Ð»Ð¸Ñа пÑавÑего Ñежима
СШÐ</a>. Ð ÑаÑÑноÑÑи, компаниÑ
@@ -188,9 +186,7 @@
<h3 id="microsoft">ТÑÑÑÐ¼Ñ Microsoft</h3>
<ul class="blurbs">
-
- <!-- INSERT microsoft -->
-<li id="M201706130">
+ <li id="M201706130">
<p>Windows 10 S бÑла ÑÑÑÑмой: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
можно бÑло ÑÑÑановиÑÑ Ð¸ вÑполнÑÑÑ ÑолÑко
пÑогÑÐ°Ð¼Ð¼Ñ Ð¸Ð· Windows
@@ -291,7 +287,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-sabotage.fr.html 10 Oct 2018 10:57:51 -0000 1.55
+++ proprietary-sabotage.fr.html 17 Oct 2018 10:01:34 -0000 1.56
@@ -38,12 +38,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
-
- <!-- INSERT sabotage -->
-<li id="M201807050">
+ <li id="M201807050">
<p>Le «â¯traqueur d'activitéâ¯Â» de Jawbone était couplé à une
appli mobile
privatrice. En 2017, la société a fermé et a rendu l'appli inopérante. <a
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">Tous
@@ -556,7 +554,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/10 10:57:51 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-sabotage.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.ru.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-sabotage.ru.html 11 Oct 2018 06:59:25 -0000 1.47
+++ proprietary-sabotage.ru.html 17 Oct 2018 10:01:34 -0000 1.48
@@ -38,12 +38,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
-
- <!-- INSERT sabotage -->
-<li id="M201807050">
+ <li id="M201807050">
<p>ФизкÑлÑÑÑÑное ÑÑÑÑойÑÑво Jawbone бÑло
пÑивÑзано к неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð¾Ð¼Ñ ÑелеÑонномÑ
пÑиложениÑ. Ð 2017 Ð³Ð¾Ð´Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ
закÑÑлаÑÑ Ð¸ пÑекÑаÑила ÑабоÑÑ
пÑиложениÑ. <a
@@ -549,7 +547,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/11 06:59:25 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-subscriptions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.fr.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-subscriptions.fr.html 9 Oct 2018 13:30:40 -0000 1.15
+++ proprietary-subscriptions.fr.html 17 Oct 2018 10:01:34 -0000 1.16
@@ -42,12 +42,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
<ul class="blurbs">
-
- <!-- INSERT subscriptions -->
-<li id="M201711010">
+ <li id="M201711010">
<p>Sony a ressorti son robot de compagnie Aibo, cette fois-ci <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">avec
une porte dérobée universelle, ainsi qu'une dépendance à un serveur avec
@@ -167,7 +165,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-subscriptions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.ru.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-subscriptions.ru.html 9 Oct 2018 13:30:40 -0000 1.12
+++ proprietary-subscriptions.ru.html 17 Oct 2018 10:01:34 -0000 1.13
@@ -41,12 +41,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
<ul class="blurbs">
-
- <!-- INSERT subscriptions -->
-<li id="M201711010">
+ <li id="M201711010">
<p>Sony Ñнова вÑпÑÑÑила ÑÐ²Ð¾Ñ ÑобаÑкÑ-ÑобоÑа
Aibo, на ÑÑÐ¾Ñ Ñаз <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
Ñ ÑнивеÑÑалÑнÑм ÑеÑнÑм Ñ
одом, и пÑивÑзала
к ÑеÑвеÑÑ, коÑоÑÑй ÑÑебÑеÑ
@@ -167,7 +165,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-surveillance.fr.html 7 Oct 2018 22:29:11 -0000 1.136
+++ proprietary-surveillance.fr.html 17 Oct 2018 10:01:34 -0000 1.137
@@ -182,9 +182,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT windows -->
-<li id="M201712110">
+ <li id="M201712110">
<p>Dans le système d'exploitation privateur de HP, on trouve <a
href="http://www.bbc.com/news/technology-42309371">un pilote pour le clavier
qui contient un enregistreur de frappe <cite>[key logger]</cite></a>.</p>
@@ -355,9 +353,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT macos -->
-<li id="M201809070">
+ <li id="M201809070">
<p>Adware Doctor, un bloqueur de pubs pour MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">envoie
l'historique de navigation de l'utilisateur à sa maison mère</a>. </p>
@@ -422,9 +418,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT bios -->
-<li id="M201509220">
+ <li id="M201509220">
<p><a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">Lenovo
a installé furtivement des logiciels promotionnels et espions via le
@@ -452,9 +446,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT phones -->
-<li id="M201601110">
+ <li id="M201601110">
<p>L'extension naturelle de la surveillance des gens au moyen de « leurÂ
»
téléphone est <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">le
@@ -503,9 +495,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT ithings -->
-<li id="M201711250">
+ <li id="M201711250">
<p>La DMCA et la directive de l'UE relative au droit d'auteur rendent <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">illégal
d'étudier la manière dont les applis sous iOS espionnent l'utilisateur</a>
@@ -629,9 +619,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT android -->
-<li id="M201711210">
+ <li id="M201711210">
<p>Android fait de la géolocalisation pour Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">même
quand les « services de localisation » sont désactivés, et même quand le
@@ -728,9 +716,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT e-readers -->
-<li id="M201603080">
+ <li id="M201603080">
<p>Les livres électroniques peuvent contenir du code JavaScript et <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">quelquefois
ce code espionne les utilisateurs</a>.</p>
@@ -774,9 +760,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT apps -->
-<li id="M201808030">
+ <li id="M201808030">
<p>Certaines applis Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">enregistrent
la position de l'utilisateur même quand il désactive la
géolocalisation</a>.</p>
@@ -1197,9 +1181,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT skype -->
-<li id="M201307110">
+ <li id="M201307110">
<p>Skype aussi <a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">contient
un espiogiciel</a> ; Microsoft l'a modifié <a
@@ -1216,9 +1198,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT games -->
-<li id="M201806240">
+ <li id="M201806240">
<p>Red Shell est un espiogiciel présent dans beaucoup de jeux privateurs.
Il <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">récupère
des données sur l'ordinateur de l'utilisateur et les envoie à des
tiers</a>.</p>
@@ -1301,9 +1281,7 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-
- <!-- INSERT stings -->
-<li id="M201708280">
+ <li id="M201708280">
<p>La mauvaise sécurisation de beaucoup d'appareils de l'Internet des
dangers
permet aux <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">fournisseurs
@@ -1330,9 +1308,7 @@
téléviseurs « intelligents » ou « connectés ».</p>
<ul class="blurbs">
-
- <!-- INSERT tvsets -->
-<li id="M201804010">
+ <li id="M201804010">
<p>Certains téléviseurs « intelligents » téléchargent
automatiquement des <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">mises
à jour régressives qui installent une appli de surveillance</a>.</p>
@@ -1488,9 +1464,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT cameras -->
-<li id="M201603220">
+ <li id="M201603220">
<p>Plus de 70 modèles de caméras de surveillance connectées au réseau
ont <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">des
failles de sécurité qui permettent à n'importe qui de s'en servir pour
@@ -1515,9 +1489,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT toys -->
-<li id="M201711244">
+ <li id="M201711244">
<p>Le jouet <cite>Furby Connect</cite> a une <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">porte
dérobée universelle</a>. Même si ce produit, tel qu'il est livré, n'est pas
@@ -1599,9 +1571,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT drones -->
-<li id="M201708040">
+ <li id="M201708040">
<p>Pendant que vous utilisez un drone DJI pour espionner d'autres
personnes, le
DJI est dans la plupart des cas <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">en
@@ -1616,9 +1586,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT home -->
-<li id="M201808120">
+ <li id="M201808120">
<p>Des crackers ont trouvé moyen de contourner les dispositifs de
sécurité d'un
appareil d'Amazon et de <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">le transformer
@@ -1675,9 +1643,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT wearables -->
-<li id="M201807260">
+ <li id="M201807260">
<p>Les vêtements de Tommy Hilfiger <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">vont
surveiller combien de fois ils sont portés</a>.</p>
@@ -1691,9 +1657,7 @@
<h5 id="SpywareOnSmartWatches">Montres « intelligentes »</h5>
<ul class="blurbs">
-
- <!-- INSERT watches -->
-<li id="M201603020">
+ <li id="M201603020">
<p>Une « montre intelligente » très bon marché est livrée avec une
appli
Android <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">qui
@@ -1720,9 +1684,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT cars -->
-<li id="M201711230">
+ <li id="M201711230">
<p>Les applis d'aide à la conduite intégrant de l'intelligence
artificielle
peuvent <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">suivre
@@ -1789,9 +1751,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT virtual -->
-<li id="M201612230">
+ <li id="M201612230">
<p>L'équipement de réalité virtuelle, en mesurant chaque petit
mouvement, rend
possible la plus intime des surveillances. Pour réaliser ce potentiel il
suffit d'un <a
@@ -1820,9 +1780,7 @@
mais ce flicage constitue malgré tout un abus.</p>
<ul class="blurbs">
-
- <!-- INSERT websites -->
-<li id="M201805170">
+ <li id="M201805170">
<p>Le program Storyful <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">espionne
les journalistes qui l'utilisent</a>.</p>
@@ -1891,9 +1849,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT javascript -->
-<li id="M201807190">
+ <li id="M201807190">
<p>British Airways a utilisé du <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">JavaScript
non libre sur son site web pour donner aux autres compagnies des données
@@ -1935,9 +1891,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT flash -->
-<li id="M201310110">
+ <li id="M201310110">
<p>Flash et JavaScript sont employés dans <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">des
dispositifs de « profilage »</a> destinés à identifier les
utilisateurs.</p>
@@ -1959,9 +1913,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT chrome -->
-<li id="M201507280">
+ <li id="M201507280">
<p>Dans Google Chrome, les extensions ont toute facilité pour <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">espionner
en détail la navigation de l'utilisateur</a>, et beaucoup ne s'en privent
@@ -1999,9 +1951,7 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-
- <!-- INSERT networks -->
-<li id="M201606030">
+ <li id="M201606030">
<p>Une enquête a montré <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">que
le GCHQ se servait de sociétés américaines et de la NSA pour contourner les
@@ -2099,7 +2049,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/07 22:29:11 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary-surveillance.ru.html 7 Oct 2018 22:29:11 -0000 1.137
+++ proprietary-surveillance.ru.html 17 Oct 2018 10:01:34 -0000 1.138
@@ -183,9 +183,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT windows -->
-<li id="M201712110">
+ <li id="M201712110">
<p>Ð ÑоÑÑав неÑвободной опеÑаÑионной
ÑиÑÑÐµÐ¼Ñ HP <a
href="http://www.bbc.com/news/technology-42309371">вÑ
одиÑ
неÑвободнÑй
дÑÐ°Ð¹Ð²ÐµÑ ÐºÐ»Ð°Ð²Ð¸Ð°ÑÑÑÑ, коÑоÑÑй запиÑÑваеÑ
вÑе нажаÑÐ¸Ñ Ð½Ð° клавиÑи</a>.</p>
@@ -356,9 +354,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT macos -->
-<li id="M201809070">
+ <li id="M201809070">
<p>Adware Doctor, блокиÑовÑик ÑÐµÐºÐ»Ð°Ð¼Ñ Ð´Ð»Ñ MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">докладÑваеÑ
об иÑÑоÑии поÑеÑений ÑайÑов
полÑзоваÑелем</a>.</p>
@@ -421,9 +417,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT bios -->
-<li id="M201509220">
+ <li id="M201509220">
<p><a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo ÑкÑÑÑно ÑÑÑанавливала
пÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð¸ дÑÑгой мÑÑÐ¾Ñ ÑеÑез BIOS</a>
@@ -451,9 +445,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT phones -->
-<li id="M201601110">
+ <li id="M201601110">
<p>ÐÑÑеÑÑвенное пÑодолжение надзоÑа за
лÑдÑми пÑи поÑÑедÑÑве “иÑ
”
ÑелеÑонов — <a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
@@ -501,9 +493,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT ithings -->
-<li id="M201711250">
+ <li id="M201711250">
<p>DMCA и ÐиÑекÑива об авÑоÑком пÑаве
ÐвÑоÑоÑза делаÑÑ <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
незаконнÑм изÑÑение Ñого, как пÑиложениÑ
iOS ÑпионÑÑ Ð·Ð° полÑзоваÑелÑми</a>,
@@ -625,9 +615,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT android -->
-<li id="M201711210">
+ <li id="M201711210">
<p>Android оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð´Ð»Ñ Google, <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">даже
когда “ÑлÑÐ¶Ð±Ñ Ð¼ÐµÑÑоположениє
вÑклÑÑенÑ, даже когда в ÑелеÑоне
@@ -725,9 +713,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT e-readers -->
-<li id="M201603080">
+ <li id="M201603080">
<p>Ð ÑлекÑÑоннÑÑ
книгаÑ
могÑÑ
ÑодеÑжаÑÑÑÑ <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">пÑогÑаммÑ
на JavaScript, коÑоÑÑе иногда подглÑдÑваÑÑ Ð·Ð°
ÑиÑаÑелÑми</a>.</p>
@@ -772,9 +758,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT apps -->
-<li id="M201808030">
+ <li id="M201808030">
<p>ÐекоÑоÑÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Google в ÑиÑÑеме
Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
запиÑÑваÑÑ Ð¼ÐµÑÑоположение полÑзоваÑелÑ,
даже когда полÑзоваÑели оÑклÑÑаÑÑ
@@ -1189,9 +1173,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT skype -->
-<li id="M201307110">
+ <li id="M201307110">
<p><a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">Skype
ÑодеÑÐ¶Ð¸Ñ Ð¿ÑогÑаммÑ-ÑпионÑ</a>. Ð Microsoft
изменили Skype <a
@@ -1208,9 +1190,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT games -->
-<li id="M201806240">
+ <li id="M201806240">
<p>Red Shell — пÑогÑамма-Ñпион,
Ð·Ð°Ð»Ð¾Ð¶ÐµÐ½Ð½Ð°Ñ Ð²Ð¾ многиÑ
неÑвободнÑÑ
игÑаÑ
. Ðна <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
@@ -1295,9 +1275,7 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-
- <!-- INSERT stings -->
-<li id="M201708280">
+ <li id="M201708280">
<p>ÐÑвÑаÑиÑелÑÐ½Ð°Ñ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑÑ Ð²Ð¾ многиÑ
ÑÑÑÑойÑÑваÑ
ÐнÑеÑнеÑа клеÑей позволÑеÑ
<a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">опеÑаÑоÑам
@@ -1324,9 +1302,7 @@
“ÑмнÑÑ
” ÑелевизоÑов Amazon.</p>
<ul class="blurbs">
-
- <!-- INSERT tvsets -->
-<li id="M201804010">
+ <li id="M201804010">
<p>ÐекоÑоÑÑе “инÑеллекÑÑалÑнÑе”
ÑелевизоÑÑ Ð°Ð²ÑомаÑиÑеÑки <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">загÑÑжаÑÑ
ÑÑÑаÑение, коÑоÑое ÑÑÑанавливаеÑ
пÑиложение Ñлежки</a>.</p>
@@ -1477,9 +1453,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT cameras -->
-<li id="M201603220">
+ <li id="M201603220">
<p>РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок
обнаÑÑÐ¶ÐµÐ½Ñ <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">недоÑеÑÑ
безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>.</p>
@@ -1503,9 +1477,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT toys -->
-<li id="M201711244">
+ <li id="M201711244">
<p>Ð Furby Connect еÑÑÑ <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>. ÐÑли пÑодÑÐºÑ Ð²
Ñом виде, в каком он
@@ -1585,9 +1557,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT drones -->
-<li id="M201708040">
+ <li id="M201708040">
<p>Ðока Ð²Ñ Ð¿Ð¾Ð»ÑзÑеÑеÑÑ Ð±ÐµÑпилоÑником DJI,
ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð´Ð³Ð»ÑдÑваÑÑ Ð·Ð° дÑÑгими, <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">DJI
во многиÑ
ÑлÑÑаÑÑ
подглÑдÑÐ²Ð°ÐµÑ Ð·Ð°
вами</a>.</p>
@@ -1601,9 +1571,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT home -->
-<li id="M201808120">
+ <li id="M201808120">
<p>ÐзломÑики наÑли ÑпоÑоб пÑобиÑÑ Ð·Ð°ÑиÑÑ
ÑÑÑÑойÑÑва Amazon и <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
пÑевÑаÑиÑÑ
его в ÑÑÑÑойÑÑво, подÑлÑÑиваÑÑее</a> Ð´Ð»Ñ Ð½Ð¸Ñ
.</p>
@@ -1658,9 +1626,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT wearables -->
-<li id="M201807260">
+ <li id="M201807260">
<p>Ðдежда Томми ÐилÑингеÑа <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">оÑÑлеживаеÑ,
как ÑаÑÑо лÑди ее надеваÑÑ</a>.</p>
@@ -1674,9 +1640,7 @@
<h5 id="SpywareOnSmartWatches">“ÐнÑеллекÑÑалÑнÑе”
ÑаÑÑ</h5>
<ul class="blurbs">
-
- <!-- INSERT watches -->
-<li id="M201603020">
+ <li id="M201603020">
<p>ÐÑÐµÐ½Ñ Ð´ÐµÑевÑе “инÑеллекÑÑалÑнÑе
ÑаÑÑ” вÑ
одÑÑ Ð² ÑоÑÑав пÑиложениÑ
Android, коÑоÑое <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">подклÑÑаеÑÑÑ
@@ -1702,9 +1666,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT cars -->
-<li id="M201711230">
+ <li id="M201711230">
<p>ÐÑогÑÐ°Ð¼Ð¼Ñ Ñ Ð¸ÑкÑÑÑÑвеннÑм
инÑеллекÑом, огÑаниÑиваÑÑие полÑзование
ÑелеÑоном
во вÑÐµÐ¼Ñ Ð²Ð¾Ð¶Ð´ÐµÐ½Ð¸Ñ, могÑÑ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -1768,9 +1730,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT virtual -->
-<li id="M201612230">
+ <li id="M201612230">
<p>ÐбоÑÑдование Ð´Ð»Ñ Ð²Ð¸ÑÑÑалÑной
ÑеалÑноÑÑи, измеÑÑÑÑее ÑамÑе неболÑÑие
движениÑ, ÑÐ¾Ð·Ð´Ð°ÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑ Ð´Ð»Ñ
беÑпÑеÑеденÑно ÑÑÑогой Ñлежки за
полÑзоваÑелем. ÐÑе, ÑÑо нÑжно длÑ
ÑеализаÑии ÑÑой возможноÑÑи —
@@ -1801,9 +1761,7 @@
ÑмÑÑла</a>, но вÑе Ñавно Ñлежка ÑвлÑеÑÑÑ
злоÑпоÑÑеблением.</p>
<ul class="blurbs">
-
- <!-- INSERT websites -->
-<li id="M201805170">
+ <li id="M201805170">
<p>ÐÑогÑамма Storyful <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">ÑпиониÑ
за ÑепоÑÑеÑами, коÑоÑÑе ÐµÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ</a>.</p>
@@ -1871,9 +1829,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT javascript -->
-<li id="M201807190">
+ <li id="M201807190">
<p>British Airways полÑзовалиÑÑ Ð½Ð° Ñвоем ÑайÑе <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">неÑвободнÑми
пÑогÑаммами на JavaScript, ÑÑÐ¾Ð±Ñ Ð²ÑдаваÑÑ
пеÑÑоналÑнÑе даннÑе ÑвоиÑ
клиенÑов
@@ -1915,9 +1871,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT flash -->
-<li id="M201310110">
+ <li id="M201310110">
<p>Flash и JavaScript пÑименÑÑÑ Ð´Ð»Ñ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
ÑнÑÑÐ¸Ñ “оÑпеÑаÑков палÑÑев”
ÑÑÑÑойÑÑв</a> Ñ ÑелÑÑ Ð¸Ð´ÐµÐ½ÑиÑикаÑии
@@ -1939,9 +1893,7 @@
</div>
<ul class="blurbs">
-
- <!-- INSERT chrome -->
-<li id="M201507280">
+ <li id="M201507280">
<p>Google Chrome легко позволÑÐµÑ ÑаÑÑиÑениÑ
веÑÑи <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">полнÑÑ
ÑÐ»ÐµÐ¶ÐºÑ Ð·Ð° полÑзованием бÑаÑзеÑом</a>, и
многие из ниÑ
Ñак и делаÑÑ.</p>
@@ -1977,9 +1929,7 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-
- <!-- INSERT networks -->
-<li id="M201606030">
+ <li id="M201606030">
<p>РаÑÑледование показÑваеÑ, ÑÑо <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">ЦенÑÑ
пÑавиÑелÑÑÑвенной ÑвÑзи ÐеликобÑиÑании
полÑзÑеÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñми СШРи ÐÐРдлÑ
@@ -2074,7 +2024,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/07 22:29:11 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-tethers.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.fr.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-tethers.fr.html 9 Oct 2018 13:30:40 -0000 1.25
+++ proprietary-tethers.fr.html 17 Oct 2018 10:01:34 -0000 1.26
@@ -39,12 +39,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
<ul class="blurbs">
-
- <!-- INSERT tethers -->
-<li id="M201809260">
+ <li id="M201809260">
<p>Les thermostats « intelligents » d'Honeywell communiquent par
l'intermédiaire du serveur de la société. Ils ont toutes les
caractéristiques de ce genre d'appareil : <a
@@ -247,7 +245,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-tethers.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-tethers.ru.html 9 Oct 2018 13:30:40 -0000 1.18
+++ proprietary-tethers.ru.html 17 Oct 2018 10:01:34 -0000 1.19
@@ -39,12 +39,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
<ul class="blurbs">
-
- <!-- INSERT tethers -->
-<li id="M201809260">
+ <li id="M201809260">
<p>“ÐнÑеллекÑÑалÑнÑе” ÑеÑмоÑÑаÑÑ
Honeywell ÑвÑзÑваÑÑÑÑ ÑолÑко Ñ
ÑеÑвеÑом компании. У ниÑ
еÑÑÑ Ð²Ñе ÑквеÑнÑе
ÑеÑÑÑ ÑакиÑ
ÑÑÑÑойÑÑв: <a
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
@@ -246,7 +244,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-tyrants.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.fr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-tyrants.fr.html 9 Oct 2018 13:30:40 -0000 1.21
+++ proprietary-tyrants.fr.html 17 Oct 2018 10:01:34 -0000 1.22
@@ -42,12 +42,10 @@
décrivant le problème.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
<ul class="blurbs">
-
- <!-- INSERT tyrants -->
-<li id="M201607150">
+ <li id="M201607150">
<p>Microsoft avait accidentellement laissé aux utilisateurs un moyen
d'installer GNU/Linux sur les tablettes fonctionnant sous Windows RT, mais
désormais <a
@@ -188,7 +186,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary-tyrants.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.ru.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-tyrants.ru.html 9 Oct 2018 13:30:40 -0000 1.19
+++ proprietary-tyrants.ru.html 17 Oct 2018 10:01:34 -0000 1.20
@@ -42,12 +42,10 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
<ul class="blurbs">
-
- <!-- INSERT tyrants -->
-<li id="M201607150">
+ <li id="M201607150">
<p>Microsoft ÑлÑÑайно оÑÑавила полÑзоваÑелÑм
ÑпоÑоб ÑÑÑановиÑÑ GNU/Linux на
планÑеÑаÑ
RT Ñ Windows, но ÑепеÑÑ Ð¾Ð½Ð¸ <a
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">“иÑпÑавили”
@@ -185,7 +183,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary.fr.html 14 Oct 2018 12:58:19 -0000 1.36
+++ proprietary.fr.html 17 Oct 2018 10:01:34 -0000 1.37
@@ -151,9 +151,7 @@
<h3 id="latest">Ajouts récents</h3>
<ul class="blurbs">
-
- <!-- INSERT proprietary -->
-<li id="M201805080">
+ <li id="M201805080">
<p>Un cracker a exploité une faille dans un logiciel non mis à jour <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">pour
injecter un « mineur » dans les pages web</a> servies aux visiteurs. Ce
type
@@ -288,7 +286,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.pt-br.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary.pt-br.html 14 Oct 2018 23:57:58 -0000 1.4
+++ proprietary.pt-br.html 17 Oct 2018 10:01:34 -0000 1.5
@@ -151,9 +151,7 @@
<h3 id="latest">Ãltimas adições</h3>
<ul class="blurbs">
-
- <!-- INSERT proprietary -->
-<li id="M201805080">
+ <li id="M201805080">
<p>Um cracker usou um exploit em software desatualizado para <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
injetar um "minerador" em páginas da web</a> servidas aos visitantes. Esse
@@ -286,7 +284,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima atualização:
-$Date: 2018/10/14 23:57:58 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary.ru.html 14 Oct 2018 13:28:27 -0000 1.32
+++ proprietary.ru.html 17 Oct 2018 10:01:34 -0000 1.33
@@ -156,9 +156,7 @@
<h3 id="latest">ÐоÑледние добавлениÑ</h3>
<ul class="blurbs">
-
- <!-- INSERT proprietary -->
-<li id="M201805080">
+ <li id="M201805080">
<p>ÐзломÑик воÑполÑзовалÑÑ Ð±ÑеÑÑÑ Ð²
необновленной пÑогÑамме Ð´Ð»Ñ <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
вÑÑавки “майнеÑа” на ÑÑÑаниÑаÑ
ÑайÑа</a>, пеÑедаваемÑÑ
@@ -292,7 +290,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/14 13:28:27 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
Index: po/malware-adobe.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.de-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-adobe.de-diff.html 9 Oct 2018 13:30:40 -0000 1.5
+++ po/malware-adobe.de-diff.html 17 Oct 2018 10:01:34 -0000 1.6
@@ -49,16 +49,15 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
-</div></em></ins></span>
+to present the specifics.</p></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
<li></strong></del></span>
-<span class="inserted"><ins><em><div class="column-limit"></div>
+<span class="inserted"><ins><em></div>
+<div class="column-limit" id="malware-adobe"></div>
<ul class="blurbs">
-<!-- INSERT adobe -->
<li id="M201701110">
<p>An upgrade package for Acrobat Reader <a
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">silently
@@ -106,7 +105,7 @@
<p>Adobe applications</em></ins></span> <a
<span
class="removed"><del><strong>href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/2013/05/adobe-creative-cloud-petition/">
- require periodic connection</em></ins></span> to <span
class="removed"><del><strong>perform a license check</a>,
at</strong></del></span> a <span class="removed"><del><strong>random time every
30
+ require periodic connection</em></ins></span> to <span
class="removed"><del><strong>perform</strong></del></span> a <span
class="removed"><del><strong>license check</a>, at a random time every 30
days.</p></li>
<li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>server</a>.</p>
@@ -190,7 +189,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-adobe.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.fr-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-adobe.fr-en.html 9 Oct 2018 13:30:40 -0000 1.9
+++ po/malware-adobe.fr-en.html 17 Oct 2018 10:01:34 -0000 1.10
@@ -40,10 +40,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
<ul class="blurbs">
-<!-- INSERT adobe -->
<li id="M201701110">
<p>An upgrade package for Acrobat Reader <a
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">silently
@@ -158,7 +157,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-adobe.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.ja-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-adobe.ja-diff.html 9 Oct 2018 13:30:40 -0000 1.5
+++ po/malware-adobe.ja-diff.html 17 Oct 2018 10:01:34 -0000 1.6
@@ -49,16 +49,15 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
-</div></em></ins></span>
+to present the specifics.</p></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
<li></strong></del></span>
-<span class="inserted"><ins><em><div class="column-limit"></div>
+<span class="inserted"><ins><em></div>
+<div class="column-limit" id="malware-adobe"></div>
<ul class="blurbs">
-<!-- INSERT adobe -->
<li id="M201701110">
<p>An upgrade package for Acrobat Reader <a
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">silently
@@ -106,7 +105,7 @@
<p>Adobe applications</em></ins></span> <a
<span
class="removed"><del><strong>href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/2013/05/adobe-creative-cloud-petition/">
- require periodic connection</em></ins></span> to <span
class="removed"><del><strong>perform a license check</a>,
at</strong></del></span> a <span class="removed"><del><strong>random time every
30
+ require periodic connection</em></ins></span> to <span
class="removed"><del><strong>perform</strong></del></span> a <span
class="removed"><del><strong>license check</a>, at a random time every 30
days.</p></li>
<li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>server</a>.</p>
@@ -190,7 +189,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-adobe.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.ru-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-adobe.ru-en.html 9 Oct 2018 13:30:40 -0000 1.10
+++ po/malware-adobe.ru-en.html 17 Oct 2018 10:01:34 -0000 1.11
@@ -40,10 +40,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
<ul class="blurbs">
-<!-- INSERT adobe -->
<li id="M201701110">
<p>An upgrade package for Acrobat Reader <a
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">silently
@@ -158,7 +157,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-amazon.es-en.html 12 Oct 2018 07:58:36 -0000 1.12
+++ po/malware-amazon.es-en.html 17 Oct 2018 10:01:34 -0000 1.13
@@ -53,7 +53,6 @@
<h4 id="back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT swindle-back-door -->
<li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
@@ -86,7 +85,6 @@
<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT swindle-surv -->
<li id="M201212031">
<p>The Electronic Frontier Foundation has examined and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
@@ -98,7 +96,6 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
-<!-- INSERT swindle-dr -->
<li id="M201704131">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
@@ -117,7 +114,6 @@
<h4 id="echo-back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT echo-back-door -->
<li id="M201606060">
<p>The Amazon Echo appears to have a universal back door, since <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
@@ -133,7 +129,6 @@
<h4 id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT echo-surv -->
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -155,7 +150,6 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
-<!-- INSERT amazon-misc -->
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -228,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-amazon.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-amazon.fr-en.html 12 Oct 2018 07:58:36 -0000 1.12
+++ po/malware-amazon.fr-en.html 17 Oct 2018 10:01:34 -0000 1.13
@@ -53,7 +53,6 @@
<h4 id="back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT swindle-back-door -->
<li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
@@ -86,7 +85,6 @@
<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT swindle-surv -->
<li id="M201212031">
<p>The Electronic Frontier Foundation has examined and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
@@ -98,7 +96,6 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
-<!-- INSERT swindle-dr -->
<li id="M201704131">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
@@ -117,7 +114,6 @@
<h4 id="echo-back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT echo-back-door -->
<li id="M201606060">
<p>The Amazon Echo appears to have a universal back door, since <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
@@ -133,7 +129,6 @@
<h4 id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT echo-surv -->
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -155,7 +150,6 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
-<!-- INSERT amazon-misc -->
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -228,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- po/malware-amazon.it-diff.html 12 Oct 2018 07:58:36 -0000 1.14
+++ po/malware-amazon.it-diff.html 17 Oct 2018 10:01:34 -0000 1.15
@@ -61,13 +61,13 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p>
-</div></em></ins></span>
+to present the specifics.</p></em></ins></span>
</div>
<span class="removed"><del><strong><h2</strong></del></span>
+<span class="inserted"><ins><em></div>
-<span class="inserted"><ins><em><p class="c" style="font-size: 1.2em">
+<p class="c" style="font-size: 1.2em">
<a href="#swindle">Kindle Swindle</a>
<a href="#echo">Echo</a>
<a href="#misc">Other products</a>
@@ -97,7 +97,6 @@
<span class="inserted"><ins><em><h4 id="back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT swindle-back-door -->
<li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
@@ -151,7 +150,6 @@
<span class="inserted"><ins><em><h4
id="surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT swindle-surv -->
<li id="M201212031">
<p>The</em></ins></span> Electronic Frontier Foundation has examined
and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
@@ -167,7 +165,6 @@
<span class="inserted"><ins><em><h4 id="drm">DRM</h4>
<ul class="blurbs">
-<!-- INSERT swindle-dr -->
<li id="M201704131">
<p><a</em></ins></span>
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
@@ -193,7 +190,6 @@
<h4 id="echo-back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT echo-back-door -->
<li id="M201606060">
<p>The</em></ins></span> Amazon Echo appears to have a universal
back door, since <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
@@ -209,7 +205,6 @@
<span class="inserted"><ins><em><h4
id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT echo-surv -->
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -231,7 +226,6 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
-<!-- INSERT amazon-misc -->
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -305,7 +299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-amazon.ja-diff.html 12 Oct 2018 07:58:36 -0000 1.13
+++ po/malware-amazon.ja-diff.html 17 Oct 2018 10:01:34 -0000 1.14
@@ -102,7 +102,6 @@
<h4 id="back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT swindle-back-door -->
<li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
@@ -146,7 +145,6 @@
<span class="inserted"><ins><em><h4
id="surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT swindle-surv -->
<li id="M201212031">
<p>The</em></ins></span> Electronic Frontier Foundation has examined
and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
@@ -162,7 +160,6 @@
<span class="inserted"><ins><em><h4 id="drm">DRM</h4>
<ul class="blurbs">
-<!-- INSERT swindle-dr -->
<li id="M201704131">
<p><a</em></ins></span>
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
@@ -182,7 +179,6 @@
<h4 id="echo-back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT echo-back-door -->
<li id="M201606060">
<p>The Amazon Echo appears to have a universal back door, since <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
@@ -198,7 +194,6 @@
<h4 id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT echo-surv -->
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -220,7 +215,6 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
-<!-- INSERT amazon-misc -->
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -294,7 +288,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:34 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-amazon.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-amazon.ru-en.html 12 Oct 2018 07:58:36 -0000 1.13
+++ po/malware-amazon.ru-en.html 17 Oct 2018 10:01:35 -0000 1.14
@@ -53,7 +53,6 @@
<h4 id="back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT swindle-back-door -->
<li id="M201503210">
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
@@ -86,7 +85,6 @@
<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT swindle-surv -->
<li id="M201212031">
<p>The Electronic Frontier Foundation has examined and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
@@ -98,7 +96,6 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
-<!-- INSERT swindle-dr -->
<li id="M201704131">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
@@ -117,7 +114,6 @@
<h4 id="echo-back-doors">Back Doors</h4>
<ul class="blurbs">
-<!-- INSERT echo-back-door -->
<li id="M201606060">
<p>The Amazon Echo appears to have a universal back door, since <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
@@ -133,7 +129,6 @@
<h4 id="echo-surveillance">Surveillance</h4>
<ul class="blurbs">
-<!-- INSERT echo-surv -->
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -155,7 +150,6 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
-<!-- INSERT amazon-misc -->
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -228,7 +222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-apple.de-diff.html 9 Oct 2018 13:30:40 -0000 1.11
+++ po/malware-apple.de-diff.html 17 Oct 2018 10:01:35 -0000 1.12
@@ -90,7 +90,6 @@
Mac</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -144,7 +143,6 @@
they do not count</strong></del></span> <span
class="inserted"><ins><em>id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
@@ -152,495 +150,496 @@
to find</a>.</p>
<p>This allows a company such</em></ins></span> as <span
class="removed"><del><strong>malware. We mention them</strong></del></span>
<span class="inserted"><ins><em>Apple</em></ins></span> to <span
class="removed"><del><strong>refute the
- supposition that prestigious proprietary software doesn't have grave
+ supposition</strong></del></span> <span class="inserted"><ins><em>say,
“We allow users
+ to turn this off” while ensuring</em></ins></span> that <span
class="removed"><del><strong>prestigious proprietary software doesn't have grave
bugs.</p>
<ul>
<li>
- <p>A vulnerability in Apple's Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>say, “We
allow users</em></ins></span>
- to <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious code from any application which uses</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> this <span
class="removed"><del><strong>API to render
- a certain kind of image file</a>.</p>
- </li>
-
- <li>
- <p>A bug in the iThings Messages
- app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site</strong></del></span> <span
class="inserted"><ins><em>off” while ensuring that few will understand
how</em></ins></span>
- to <span class="removed"><del><strong>extract all the user's messaging
history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>actually
turn it off.</p></em></ins></span>
+ <p>A vulnerability in Apple's Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>few will
understand how</em></ins></span>
+ to <span class="inserted"><ins><em>actually turn it off.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
-<p>Various proprietary programs often mess up</strong></del></span>
<span class="inserted"><ins><em>id="drm">Apple DRM</h3>
+<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
-<!-- INSERT apple-dr -->
<li id="M201704071">
- <p>DRM makes</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like
sabotage,</strong></del></span> <span class="inserted"><ins><em>iPhone 7 nearly
<a
- href="#iphone7-sabotage">unrepairable</a> by anyone
else</em></ins></span> but <span class="removed"><del><strong>they are not
grave enough to qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
+ <p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malicious code from any application which</strong></del></span>
+ <span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
</li>
<li id="M201512260">
<p><a
-
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"></em></ins></span>
- Apple <span class="removed"><del><strong>committing
-interference.</p>
-
-<ul>
- <li><p>Apple forced millions of iThings</strong></del></span>
<span class="inserted"><ins><em>uses DRM software</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
- with</em></ins></span> a <span class="removed"><del><strong>system upgrade
- <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without asking
the users</a>.
- Apple did not forcibly install</strong></del></span> <span
class="inserted"><ins><em>generic USB cable</a>.</p>
+
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
+ Apple</em></ins></span> uses <span class="removed"><del><strong>this
API</strong></del></span> <span class="inserted"><ins><em>DRM
software</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
+ with</em></ins></span> a <span class="removed"><del><strong>certain kind
of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>generic USB
cable</a>.</p></em></ins></span>
</li>
- <li id="M200811210">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200811210">
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on</em></ins></span> the <span
class="removed"><del><strong>upgrade</strong></del></span> <span
class="inserted"><ins><em>fact that a new model of Macbook introduced a
- requirement for monitors to have malicious hardware,</em></ins></span> but
<span class="inserted"><ins><em>DRM software
- in MacOS is involved in activating</em></ins></span> the <span
class="removed"><del><strong>downloading alone caused lots of
trouble.</p></strong></del></span> <span
class="inserted"><ins><em>hardware. The software for
+ DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="inserted"><ins><em>MacOS</a>. This article
+ focuses on</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
<span class="inserted"><ins><em>fact that</em></ins></span> a <span
class="removed"><del><strong>malicious web site</strong></del></span> <span
class="inserted"><ins><em>new model of Macbook introduced a
+ requirement for monitors</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>have malicious hardware, but DRM software
+ in MacOS is involved in activating</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>hardware.
The software for
accessing iTunes is also responsible.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
-<h3 id="pressuring">Apple Pressuring</h3>
-
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits</strong></del></span>
+<h3 id="interference">Apple Interference</h3>
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span>
<span class="inserted"><ins><em><li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters</em></ins></span> to <span
class="removed"><del><strong>their use of the software. This section reports
examples of hard sell</strong></del></span> <span
class="inserted"><ins><em>Bluray disks</a>. (The article focused on
Windows</em></ins></span>
- and <span class="removed"><del><strong>other unjust commercial tactics by
Apple.</p>
-
-<ul>
- <li><p>Apple Siri
- <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
to give you information</a>
- about music charts if you're not an</strong></del></span> <span
class="inserted"><ins><em>said that MacOS would do the same thing
subsequently.)</p>
+ DRM that caters</em></ins></span> to <span
class="removed"><del><strong>qualify
+for the word “sabotage”. Nonetheless, they are
nasty</strong></del></span> <span class="inserted"><ins><em>Bluray
disks</a>. (The article focused on Windows</em></ins></span>
+ and <span class="removed"><del><strong>wrong. This section describes
examples of</strong></del></span> <span class="inserted"><ins><em>said that
MacOS would do the same thing subsequently.)</p>
</li>
<li id="M200703310">
- <p>iTunes videos have DRM, which allows</em></ins></span> Apple
<span class="removed"><del><strong>Music
subscriber.</p></strong></del></span> <span class="inserted"><ins><em>to
<a
- href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
- customers can watch the videos they
purchased</a>.</p></em></ins></span>
- </li>
-</ul>
-
-
-<h3 <span class="removed"><del><strong>id="sabotage">Apple
Sabotage</h3>
-
-<p>These are situations in which</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Apple
Incompatibility</h3>
-
-<p>In this section, we list characteristics of</em></ins></span> Apple
<span class="removed"><del><strong>employs its power over</strong></del></span>
<span class="inserted"><ins><em>programs that block or
-hinder</em></ins></span> users <span class="inserted"><ins><em>from
switching</em></ins></span> to <span class="removed"><del><strong>directly
intervene</strong></del></span> <span class="inserted"><ins><em>any alternative
program—and,</em></ins></span> in <span class="removed"><del><strong>ways
that harm them or block their work.</p>
+ <p>iTunes videos have DRM, which allows</em></ins></span> Apple
<span class="removed"><del><strong>committing
+interference.</p>
<ul>
- <li>
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
- changes the file system</strong></del></span>
-<span class="inserted"><ins><em>particular,</em></ins></span> from <span
class="removed"><del><strong>HFS+</strong></del></span> <span
class="inserted"><ins><em>switching</em></ins></span> to <span
class="removed"><del><strong>APFS</a>,</strong></del></span> <span
class="inserted"><ins><em>free software</em></ins></span> which <span
class="removed"><del><strong>cannot be accessed
- from GNU/Linux, Windows or even older versions of MacOS.</p>
+ <li><p>Apple forced millions of iThings</strong></del></span> to
<span class="removed"><del><strong>download a system
upgrade</strong></del></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking the users</a>.
+ Apple did not forcibly install the upgrade but</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its
+ customers can watch</em></ins></span> the <span
class="removed"><del><strong>downloading alone caused lots of
trouble.</p></strong></del></span> <span class="inserted"><ins><em>videos
they purchased</a>.</p></em></ins></span>
</li>
+</ul>
- <li>
- <p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older
- model iThings</a>.</p>
- <p>Meanwhile, Apple stops people from fixing problems themselves;
- that's the nature of proprietary software.</p>
- </li>
+<h3 <span class="removed"><del><strong>id="pressuring">Apple
Pressuring</h3>
- <li>
- <p>The iPhone 7 contains DRM specifically designed to <a
-
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
- brick it if an “unauthorized” repair shop fixes it</a>.
- “Unauthorized” essentially means anyone besides Apple.</p>
+<p>Proprietary companies can take advantage</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Apple
Incompatibility</h3>
- <p>The article uses</strong></del></span> <span
class="inserted"><ins><em>can liberate</em></ins></span> the <span
class="removed"><del><strong>term “lock” to
describe</strong></del></span> <span
class="inserted"><ins><em>device</em></ins></span>
-the <span class="removed"><del><strong>DRM,
- but we prefer to use</strong></del></span> <span
class="inserted"><ins><em>software runs on.</p>
+<p>In this section, we list characteristics</em></ins></span> of <span
class="removed"><del><strong>their customers by imposing arbitrary
limits</strong></del></span> <span class="inserted"><ins><em>Apple programs
that block or
+hinder users from switching</em></ins></span> to <span
class="removed"><del><strong>their use of</strong></del></span> <span
class="inserted"><ins><em>any alternative program—and, in
+particular, from switching to free software which can
liberate</em></ins></span> the <span class="removed"><del><strong>software.
This section reports examples of hard sell</strong></del></span> <span
class="inserted"><ins><em>device
+the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT apple-incompat -->
<li id="M201803300">
- <p>In MacOS and iOS,</em></ins></span> the <span
class="removed"><del><strong>term <a
- href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">
- digital handcuffs</a>.</p>
- </li>
-
+ <p>In MacOS</em></ins></span> and <span
class="removed"><del><strong>other unjust commercial tactics by Apple.</p>
- <li>
- <p>The Apple Music client
- program</strong></del></span> <span class="inserted"><ins><em>procedure
for</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+<ul>
+ <li><p>Apple Siri</strong></del></span> <span
class="inserted"><ins><em>iOS, the procedure for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</strong></del></span>
<span
class="inserted"><ins><em>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
- converting images from</em></ins></span> the <span
class="removed"><del><strong>user's file system for music files, copies
them</strong></del></span> <span class="inserted"><ins><em>Photos
format</a></em></ins></span> to <span class="removed"><del><strong>an
Apple
- server,</strong></del></span> <span class="inserted"><ins><em>a free
format is so
- tedious</em></ins></span> and <span class="removed"><del><strong>deletes
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time-consuming that users just give up if they have a
+ converting images from the Photos format</a></em></ins></span> to
<span class="inserted"><ins><em>a free format is so
+ tedious and time-consuming that users just</em></ins></span> give <span
class="removed"><del><strong>you information</a>
+ about music charts</strong></del></span> <span
class="inserted"><ins><em>up</em></ins></span> if <span
class="removed"><del><strong>you're not an Apple Music
subscriber.</p></strong></del></span> <span
class="inserted"><ins><em>they have a
lot of them.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li></strong></del></span>
+<h3 id="sabotage">Apple Sabotage</h3>
- <span class="inserted"><ins><em><li id="M201802120"></em></ins></span>
- <p>Apple <span class="removed"><del><strong><a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
-stops</strong></del></span> <span class="inserted"><ins><em>devices
lock</em></ins></span> users <span class="removed"><del><strong>from fixing the
security bugs</strong></del></span> in <span
class="removed"><del><strong>Quicktime for
- Windows</a>, while refusing</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely</em></ins></span> to <span class="removed"><del><strong>fix them
itself.</p></strong></del></span> <span class="inserted"><ins><em>Apple
services</a> by being designed to be incompatible
- with all other options, ethical or unethical.</p></em></ins></span>
+<p>These are situations in which Apple employs its power
over</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201802120">
+ <p>Apple devices lock</em></ins></span> users
+<span class="removed"><del><strong>to directly intervene</strong></del></span>
in <span class="removed"><del><strong>ways that harm them or block their
work.</p>
+
+<ul>
+ <li>
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</strong></del></span> <a
+ <span
class="removed"><del><strong>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
+ changes the file system from HFS+</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being designed</em></ins></span> to
<span class="removed"><del><strong>APFS</a>, which
cannot</strong></del></span> be <span class="removed"><del><strong>accessed
+ from GNU/Linux, Windows</strong></del></span> <span
class="inserted"><ins><em>incompatible
+ with all other options, ethical</em></ins></span> or <span
class="removed"><del><strong>even older versions of
MacOS.</p></strong></del></span> <span
class="inserted"><ins><em>unethical.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>iOS version 9 for
- iThings</strong></del></span>
+ <p>Apple will stop</strong></del></span>
<span class="inserted"><ins><em><li id="M201605044">
<p>iWork (office software that runs on MacOS,
- iOS and iCloud) uses secret formats and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages</strong></del></span>
+ iOS and iCloud) uses secret formats and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older
+ model iThings</a>.</p>
+
+ <p>Meanwhile, Apple stops people</strong></del></span>
<span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/IWork">provides
no means of
- converting</em></ins></span> them <span
class="removed"><del><strong>irreparably if</strong></del></span> <span
class="inserted"><ins><em>to or from Open Document Formats</a>. iWork
- formats have changed several times since</em></ins></span> they were <span
class="removed"><del><strong>repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
- criticism from the users. However, it has not acknowledged that
- this was wrong.</p>
+ converting them to or</em></ins></span> from <span
class="removed"><del><strong>fixing problems themselves;
+ that's</strong></del></span> <span class="inserted"><ins><em>Open Document
Formats</a>. iWork
+ formats have changed several times since they were first
+ introduced. This may have had</em></ins></span> the <span
class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>effect</em></ins></span> of <span
class="removed"><del><strong>proprietary software.</p>
</li>
- <li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
- An Apple firmware “upgrade” bricked iPhones
that</strong></del></span> <span class="inserted"><ins><em>first
- introduced. This may have</em></ins></span> had <span
class="removed"><del><strong>been
- unlocked.</a> The “upgrade” also deactivated applications
- not approved by <a href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All this was apparently intentional.</p>
- </li>
+ <li>
+ <p>The iPhone 7 contains DRM specifically designed
to</strong></del></span> <span
class="inserted"><ins><em>thwarting</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock">
+ brick it if an “unauthorized” repair shop fixes it</a>.
+ “Unauthorized” essentially means anyone besides Apple.</p>
- <li><p>Apple
- <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods</strong></del></span> the <span
class="removed"><del><strong>music that users had got</strong></del></span>
<span class="inserted"><ins><em>effect of thwarting <a
- href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
- efforts</a>, thus preventing free software</em></ins></span> from
<span class="removed"><del><strong>internet music
- stores that competed with iTunes</a>.</p></strong></del></span>
<span class="inserted"><ins><em>fully supporting
+ <p>The article uses the term “lock” to describe the DRM,
+ but we prefer to use the term</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://github.com/obriensp/iWorkFileFormat">reverse
engineering
+ efforts</a>, thus preventing free software from fully supporting
them.</p>
- <p>iWork formats are considered <a
-
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
+ <p>iWork formats are considered</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">
+ digital handcuffs</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
unfit for document preservation</a>.</p></em></ins></span>
</li>
-</ul>
-<h3 <span class="removed"><del><strong>id="surveillance">Apple
Surveillance</h3>
-<ul>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>id="insecurity">Apple Insecurity</h3>
+ <span class="removed"><del><strong><li>
+ <p>The Apple Music client
+ program <a
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<p>These bugs are/were not intentional, so unlike</em></ins></span> the
<span class="removed"><del><strong>phone is snooping on
- them.</p></li>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span
class="inserted"><ins><em>rest</em></ins></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can
- get them from there.</p>
- </li>
+<h3 id="insecurity">Apple Insecurity</h3>
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</strong></del></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>file
- they do not count as malware. We mention them to refute</em></ins></span>
the <span class="removed"><del><strong>server records these numbers for at
least 30
- days.</p>
+<p>These bugs are/were not intentional, so unlike the rest
of</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file <span
class="removed"><del><strong>system for music files,
copies</strong></del></span>
+ <span class="inserted"><ins><em>they do not count as malware. We
mention</em></ins></span> them to <span class="removed"><del><strong>an Apple
+ server, and deletes them</a>.</p>
</li>
- <li><p>Users cannot make</strong></del></span>
+ <li>
+ <p>Apple <a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
+stops users from fixing</strong></del></span> <span
class="inserted"><ins><em>refute</em></ins></span> the <span
class="removed"><del><strong>security bugs</strong></del></span>
<span class="inserted"><ins><em>supposition that prestigious proprietary
software doesn't have grave
bugs.</p>
<ul class="blurbs">
-<!-- INSERT apple-insec -->
<li id="M201607220">
- <p>A vulnerability in Apple's Image I/O API
allowed</em></ins></span> an <span class="removed"><del><strong>Apple ID (<a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary</strong></del></span>
<span class="inserted"><ins><em>attacker</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps</a>) without giving
a valid email address and receiving the verification</strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious</em></ins></span> code <span class="removed"><del><strong>Apple
- sends</strong></del></span> <span class="inserted"><ins><em>from any
application which uses this API</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span> <span
class="inserted"><ins><em>render a
- certain kind of image file</a>.</p></em></ins></span>
+ <p>A vulnerability</em></ins></span> in <span
class="removed"><del><strong>Quicktime for
+ Windows</a>, while refusing</strong></del></span> <span
class="inserted"><ins><em>Apple's Image I/O API allowed an
attacker</em></ins></span> to <span class="removed"><del><strong>fix them
itself.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload</strong></del></span>
- <span class="inserted"><ins><em><li id="M201604120">
- <p>A bug in the iThings Messages app <a
+ <li>
+ <p>iOS version 9 for
+ iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ them irreparably if they were repaired by someone other than
+ Apple</a>. Apple eventually backed off</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malicious code</em></ins></span> from <span class="inserted"><ins><em>any
application which uses</em></ins></span> this <span
class="removed"><del><strong>policy under
+ criticism from</strong></del></span> <span class="inserted"><ins><em>API
to render a
+ certain kind of image file</a>.</p>
+ </li>
+
+ <li id="M201604120">
+ <p>A bug in</em></ins></span> the <span
class="removed"><del><strong>users. However, it has not acknowledged that
+ this was wrong.</p></strong></del></span> <span
class="inserted"><ins><em>iThings Messages app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</strong></del></span> <span
class="inserted"><ins><em>extract</em></ins></span> all the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>user's messaging
- history</a>.</p>
+ a malicious web site to extract all the user's messaging
+ history</a>.</p></em></ins></span>
</li>
- <li id="M201311120">
+ <span class="removed"><del><strong><li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An Apple firmware “upgrade” bricked iPhones that had been
+ unlocked.</a></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311120">
<p><a
-
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones,
- Android,</em></ins></span> and
- <span class="removed"><del><strong>videos</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></em></ins></span>
+ The <span class="removed"><del><strong>“upgrade” also
deactivated applications</strong></del></span> <span
class="inserted"><ins><em>NSA can tap data in smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is</em></ins></span> not
<span class="removed"><del><strong>approved by <a
href="/proprietary/proprietary-jails.html">Apple
+ censorship</a>. All</strong></del></span> <span
class="inserted"><ins><em>much
+ detail here, it seems that</em></ins></span> this <span
class="removed"><del><strong>was apparently intentional.</p>
+ </li>
+
+ <li><p>Apple
+ <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods</strong></del></span> <span
class="inserted"><ins><em>does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>music that users had got from
internet music
+ stores</strong></del></span> <span class="inserted"><ins><em>universal back
door</em></ins></span> that <span class="removed"><del><strong>competed with
iTunes</a>.</p></strong></del></span> <span
class="inserted"><ins><em>we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p>
+ lots of bugs in the phones' radio
software</a>.</p></em></ins></span>
</li>
</ul>
-<!--
-<h3 id="interference">Apple Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but</em></ins></span> they <span
class="removed"><del><strong>make.</p>
+<span class="inserted"><ins><em><!--</em></ins></span>
+<h3 <span class="removed"><del><strong>id="surveillance">Apple
Surveillance</h3>
+<ul>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>id="interference">Apple
Interference</h3>
+<p>Various proprietary programs often mess up</em></ins></span> the
<span class="removed"><del><strong>phone is snooping on
+ them.</p></li>
- <blockquote><p>
- iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>are not grave
enough to qualify
-for the word “sabotage”. Nonetheless, they are
nasty</em></ins></span> and <span class="removed"><del><strong>keeps
them</strong></del></span> <span class="inserted"><ins><em>wrong. This section
describes examples of Apple committing
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span> <span
class="inserted"><ins><em>user's system. They are like sabotage, but they are
not grave enough</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>qualify
+for</em></ins></span> the <span class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>word
“sabotage”. Nonetheless, they are nasty and wrong. This section
describes examples of Apple committing
interference.</p> -->
<h3 id="jails">Apple Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
-iOS, the operating system of the Apple iThings, is the prototype
-of a jail</a>. It was Apple that introduced the practice of
+iOS, the operating system of</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an</strong></del></span> Apple <span
class="removed"><del><strong>ID (<a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary
to install even gratis apps</a>) without giving</strong></del></span>
<span class="inserted"><ins><em>iThings, is the prototype
+of</em></ins></span> a <span class="removed"><del><strong>valid email address
and receiving</strong></del></span> <span
class="inserted"><ins><em>jail</a>. It was Apple that
introduced</em></ins></span> the <span
class="removed"><del><strong>verification</strong></del></span> <span
class="inserted"><ins><em>practice of
designing general purpose computers with censorship of application
programs.</p>
<p>Here is an article about the <a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that the iThings use to lock</em></ins></span> up <span
class="inserted"><ins><em>the user.</p>
-
-<p>Curiously, Apple is beginning</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
- Any edits you make</strong></del></span> <span
class="inserted"><ins><em>allow limited passage through the
-walls of the iThing jail: users can now install apps built from
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"></em></ins></span>
+code <span class="removed"><del><strong>Apple
+ sends</strong></del></span> <span
class="inserted"><ins><em>signing</a> that the iThings
use</em></ins></span> to <span class="removed"><del><strong>it.</p>
+ </li>
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>lock up the user.</p>
+
+<p>Curiously, Apple is beginning</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> <span
class="inserted"><ins><em>allow limited passage through</em></ins></span> the
<span class="removed"><del><strong>photos and
+ videos</strong></del></span>
+<span class="inserted"><ins><em>walls of the iThing jail: users can now
install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they</em></ins></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
+cannot do this freely because</em></ins></span> they <span
class="removed"><del><strong>make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make</strong></del></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
</p></blockquote>
<p>(From</strong></del></span> <span
class="inserted"><ins><em>required to identify
themselves.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span
class="inserted"><ins><em>href="https://developer.apple.com/xcode/">Here
-are details</a>. While this</em></ins></span> is <span
class="inserted"><ins><em>a crack in the prison walls, it is not
-big enough to mean that the iThings are no longer jails.</p>
+are details</a>. While this</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>a crack
in</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
-<h4>Examples of censorship by Apple jails</h4>
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>prison walls, it</em></ins></span> is <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>not
+big enough</em></ins></span> to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active</strong></del></span> <span
class="inserted"><ins><em>mean that the iThings are no longer jails.</p>
+
+<h4>Examples of censorship</em></ins></span> by <span
class="removed"><del><strong>default so</strong></del></span> <span
class="inserted"><ins><em>Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
- censoring apps for the US government too</a>. Specifically, it is
- deleting apps developed by Iranians.</p>
-
- <p>The root of these wrongs are in Apple. If Apple had not designed
- the iMonsters to let Apple censor applications, Apple would not have
- had the power to stop users from installing whatever kind of
apps.</p>
- </li>
-
- <li id="M201707290">
- <p>Apple <a
-
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
- deleted several VPNs from its app store for China</a>, thus using its
- own censorship power to strengthen that of the Chinese
government.</p>
- </li>
-
- <li id="M201701064">
- <p>Apple used its censorship system to enforce Russian
surveillance</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0"></em></ins></span>
- by <span class="removed"><del><strong>the
- startup</strong></del></span> <span class="inserted"><ins><em>blocking
distribution</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span class="inserted"><ins><em>the
LinkedIn app in Russia</a>.</p>
-
- <p>This is ironic because LinkedIn</em></ins></span> is a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>surveillance system itself.
- While subjecting its users</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>its own
surveillance,</em></ins></span> it <span class="removed"><del><strong>still
counts as a
+ censoring apps for the US government too</a>.
Specifically,</em></ins></span> it <span class="removed"><del><strong>still
counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage of
this</strong></del></span> <span
class="inserted"><ins><em>tries</em></ins></span> to
- <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They
needed</strong></del></span>
- <span class="inserted"><ins><em>protect its users from Russian
surveillance, and is therefore subject</em></ins></span>
- to <span class="removed"><del><strong>break</strong></del></span> <span
class="inserted"><ins><em>Russian censorship.</p>
+ <p>Unknown people apparently took advantage of this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>is
+ deleting apps developed by Iranians.</p>
- <p>However, the point here is the wrong of</em></ins></span> Apple's
- <span class="removed"><del><strong>security to get at them, but NSA can
access any</strong></del></span> <span
class="inserted"><ins><em>censorship</em></ins></span> of <span
class="removed"><del><strong>them through
+ <p>The root</em></ins></span> of <span
class="removed"><del><strong>them through
<a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
<li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends</strong></del></span>
- <span class="inserted"><ins><em>apps.</p>
- </li>
-
- <li id="M201701050">
- <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>Apple servers unsaved documents being
- edited</a>. The</strong></del></span> <span
class="inserted"><ins><em>enforce China's censorship</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
- things you have not decided to save are even more sensitive
than</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by blocking distribution of</em></ins></span> the
- <span class="removed"><del><strong>things you have stored in
files</a>.</p></strong></del></span> <span
class="inserted"><ins><em>New York Times
app</a>.</p></em></ins></span>
+ MacOS automatically sends to Apple servers unsaved documents being
+ edited</a>. The <a
+
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
+ things you have not decided to save</strong></del></span> <span
class="inserted"><ins><em>these wrongs</em></ins></span> are <span
class="removed"><del><strong>even more sensitive than the
+ things you have stored</strong></del></span> in <span
class="removed"><del><strong>files</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple has made
various</strong></del></span>
+ <li><p>Apple has made various
+ <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files to</strong></del></span> <span
class="inserted"><ins><em>Apple. If</em></ins></span> Apple <span
class="removed"><del><strong>servers without asking permission</a>.
+ This exposes</strong></del></span> <span class="inserted"><ins><em>had not
designed</em></ins></span>
+ the <span class="removed"><del><strong>files to Big Brother and
perhaps</strong></del></span> <span
class="inserted"><ins><em>iMonsters</em></ins></span> to <span
class="removed"><del><strong>other snoops.</p>
- <span class="inserted"><ins><em><li id="M201605190">
- <p>Apple censors games,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
- MacOS programs send files to Apple servers without asking
permission</a>.
- This exposes</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning some games from</em></ins></span> the <span
class="removed"><del><strong>files to Big Brother and perhaps to other
snoops.</p>
-
- <p>It also demonstrates how you can't trust proprietary
software,</strong></del></span> <span class="inserted"><ins><em>cr…app
store</a></em></ins></span> because <span
class="removed"><del><strong>even if today's version doesn't have a malicious
+ <p>It also demonstrates how you can't trust proprietary software,
+ because even if today's version doesn't</strong></del></span> <span
class="inserted"><ins><em>let Apple censor applications, Apple would
not</em></ins></span> have <span class="removed"><del><strong>a malicious
functionality, tomorrow's version might add it. The developer won't
- remove the malfeature unless many users push back hard, and the users
- can't remove it themselves.</p></strong></del></span> <span
class="inserted"><ins><em>of which
- political points they suggest. Some political points are apparently
- considered acceptable.</p></em></ins></span>
+ remove the malfeature unless many users push back hard,
and</strong></del></span>
+ <span class="inserted"><ins><em>had</em></ins></span> the <span
class="inserted"><ins><em>power to stop</em></ins></span> users
+ <span class="removed"><del><strong>can't remove it
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>from installing whatever kind of
apps.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
- <span class="inserted"><ins><em><li id="M201509290">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
<span
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
- banned a program from</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send reports to Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>App
Store</a> because its developers
- committed the enormity of disassembling some
iThings.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201707290">
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
+ the latest MacOS send reports</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
+ deleted several VPNs from its app store for China</a>, thus using its
+ own censorship power</em></ins></span> to <span
class="removed"><del><strong>Apple</a>
servers.</p></strong></del></span> <span
class="inserted"><ins><em>strengthen that of the Chinese
government.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware in
MacOS:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509230">
- <p>As of 2015, Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms to
Apple.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically bans apps that endorse abortion rights or would help
- women find abortions</a>.</p>
+ <span class="removed"><del><strong><li><p>Spyware in MacOS:
+ <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms</strong></del></span>
- <p>This particular political slant <a
-
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple services</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201701064">
+ <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>Apple.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
admits</strong></del></span>
+ <li><p>Apple admits the</strong></del></span> <span
class="inserted"><ins><em>enforce Russian surveillance</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+ spying</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ by blocking distribution of the LinkedIn app</em></ins></span> in <span
class="inserted"><ins><em>Russia</a>.</p>
- <span class="inserted"><ins><em><li id="M201506250">
- <p>Apple has banned iThing
- applications that show</em></ins></span> the <span
class="inserted"><ins><em>confederate flag.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
- Not only those that use it as</em></ins></span> a <span
class="removed"><del><strong>search facility</a>,</strong></del></span>
<span class="inserted"><ins><em>symbol of racism</a>,</em></ins></span>
but <span class="removed"><del><strong>there's a lot
+ <p>This is ironic because LinkedIn is</em></ins></span> a <span
class="removed"><del><strong>search facility</a>, but there's a lot
<a href="https://github.com/fix-macosx/yosemite-phone-home">
- more snooping</strong></del></span> <span class="inserted"><ins><em>even
- strategic games</em></ins></span> that <span
class="removed"><del><strong>Apple has not talked about</a>.</p>
+ more snooping that Apple has not talked about</a>.</p>
</li>
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>use it</em></ins></span> to <span
class="removed"><del><strong>exist for no possible
- purpose other than surveillance</a>. Here is the <a
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>surveillance system itself.
+ While subjecting its users</em></ins></span> to <span
class="removed"><del><strong>exist for no possible
+ purpose other than surveillance</a>. Here</strong></del></span> <span
class="inserted"><ins><em>its own surveillance, it tries to
+ protect its users from Russian surveillance, and is therefore subject
+ to Russian censorship.</p>
+
+ <p>However, the point here</em></ins></span> is the <span
class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>wrong of Apple's censorship of
+ apps.</p></em></ins></span>
</li>
- <li><p>The <a class="not-a-duplicate"
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201701050">
+ <p>Apple used its censorship system to enforce China's
censorship</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p>
+ iBeacon</a> lets stores determine exactly where</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
+ by blocking distribution of</em></ins></span> the <span
class="removed"><del><strong>iThing is, and
+ get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>New York Times
app</a>.</p></em></ins></span>
</li>
- <li><p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>represent confederate army units
- fighting in</em></ins></span> the <span
class="removed"><del><strong>state</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>Civil
War.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
- <p>This <span class="removed"><del><strong>may have improved with
+ <span class="inserted"><ins><em><li id="M201605190">
+ <p>Apple censors games,</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+ banning</em></ins></span> some <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>games</em></ins></span> from <span
class="removed"><del><strong>iPhones for</strong></del></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with
<a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but
- <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></strong></del></span>
<span class="inserted"><ins><em>ludicrous rigidity illustrates the point that
Apple should</em></ins></span>
- not <span class="removed"><del><strong>as much as</strong></del></span>
<span class="inserted"><ins><em>be allowed to censor apps. Even
if</em></ins></span> Apple <span
class="removed"><del><strong>claims</a>.</p>
+ iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>cr…app store</a> because of which
+ political points they suggest. Some political points are apparently
+ considered acceptable.</p>
</li>
-</ul>
+
+ <li id="M201509290">
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+ banned a program from the App Store</a> because its developers
+ committed the enormity of disassembling some
iThings.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
<h3 id="incompatibility">Apple Incompatibility</h3>
-<p>In</strong></del></span> <span class="inserted"><ins><em>carried
out</em></ins></span> this <span class="removed"><del><strong>section, we list
characteristics</strong></del></span> <span class="inserted"><ins><em>act of
- censorship with some care, it would still be wrong. Whether racism
- is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power to impose its views
- about either</em></ins></span> of <span class="removed"><del><strong>Apple
programs that block</strong></del></span> <span class="inserted"><ins><em>these
questions,</em></ins></span> or
-<span class="removed"><del><strong>hinder users from switching
to</strong></del></span> any <span class="removed"><del><strong>alternative
program—and, in
+<p>In this section, we list characteristics</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509230">
+ <p>As</em></ins></span> of <span
class="inserted"><ins><em>2015,</em></ins></span> Apple <span
class="removed"><del><strong>programs</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+ systematically bans apps</em></ins></span> that <span
class="removed"><del><strong>block</strong></del></span> <span
class="inserted"><ins><em>endorse abortion rights</em></ins></span> or
+<span class="removed"><del><strong>hinder users from switching to any
alternative program—and, in
particular, from switching to free software which can liberate the device
the software runs on.</p>
<ul>
-<li></strong></del></span> <span
class="inserted"><ins><em>other.</p>
- </li>
+<li>
+<p>Apple devices lock users in</strong></del></span> <span
class="inserted"><ins><em>would help
+ women find abortions</a>.</p>
- <li id="M201412110">
- <p><a
-
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
- </li>
-
- <li id="M201405250"></em></ins></span>
- <p>Apple <span class="removed"><del><strong>devices lock
users</strong></del></span> <span class="inserted"><ins><em>used this
censorship power</em></ins></span> in <span class="removed"><del><strong><a
-href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
-solely to Apple services</a> by being designed</strong></del></span>
<span class="inserted"><ins><em>2014</em></ins></span> to <span
class="removed"><del><strong>be incompatible with</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban</em></ins></span> all <span class="inserted"><ins><em>bitcoin
apps</a> for the iThings for a time. It also <a
-
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
- banned a game about growing marijuana</a>, while permitting games
- about</em></ins></span> other <span class="removed"><del><strong>options,
ethical or unethical.</p></strong></del></span> <span
class="inserted"><ins><em>crimes such as killing people. Perhaps Apple
considers
- killing more acceptable than marijuana.</p></em></ins></span>
+ <p>This particular political slant</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+solely to Apple services</a> by being designed to be incompatible with
all</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+ affects</em></ins></span> other <span
class="removed"><del><strong>options, ethical or
unethical.</p></strong></del></span> <span
class="inserted"><ins><em>Apple services</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>iWork (office software</strong></del></span>
- <span class="inserted"><ins><em><li id="M201402070">
- <p>Apple rejected an app</em></ins></span> that <span
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
-formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means
-of converting them to or from Open Document Formats</a>. iWork formats
+ <span class="inserted"><ins><em><li id="M201506250">
+ <p>Apple has banned iThing
+ applications</em></ins></span> that <span
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
+formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means</strong></del></span> <span class="inserted"><ins><em>show the
confederate flag. <a
+
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
+ Not only those that use it as a symbol</em></ins></span> of <span
class="removed"><del><strong>converting them</strong></del></span> <span
class="inserted"><ins><em>racism</a>, but even
+ strategic games that use it</em></ins></span> to <span
class="removed"><del><strong>or from Open Document Formats</a>. iWork
formats
have changed several times since they were first introduced. This may have
-had</strong></del></span> <span
class="inserted"><ins><em>displayed</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>locations</em></ins></span>
- of <span class="removed"><del><strong>thwarting <a
+had</strong></del></span> <span class="inserted"><ins><em>represent
confederate army units
+ fighting in</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>Civil War.</p>
+
+ <p>This ludicrous rigidity illustrates the point that Apple should
+ not be allowed to censor apps. Even if Apple carried out this
act</em></ins></span> of <span class="removed"><del><strong>thwarting <a
href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
efforts</a>, thus preventing free software from fully supporting
them.</p>
-<p>iWork formats are considered <a
+<p>iWork formats</strong></del></span>
+ <span class="inserted"><ins><em>censorship with some care, it would still
be wrong. Whether racism
+ is bad, whether educating people about drone attacks is
bad,</em></ins></span> are <span class="removed"><del><strong>considered <a
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
-unfit for document preservation</a>.</p>
-</li>
+unfit for document preservation</a>.</p></strong></del></span>
<span class="inserted"><ins><em>not
+ the real issue. Apple should not have the power to impose its views
+ about either of these questions, or any other.</p></em></ins></span>
+ </li>
-<li>
-<p>In MacOS and iOS,</strong></del></span> <span
class="inserted"><ins><em>US drone assassinations, giving various excuses. Each
- time</em></ins></span> the <span class="removed"><del><strong>procedure
for</strong></del></span> <span class="inserted"><ins><em>developers fixed one
“problem”, Apple
- complained about another. After the fifth rejection,
Apple</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
-converting images from</strong></del></span>
- <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>Photos format</a></strong></del></span>
<span class="inserted"><ins><em>app based on the subject
matter</a>.</p>
+<span class="removed"><del><strong><li>
+<p>In MacOS</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201412110">
+ <p><a
+
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
+ More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>iOS,</strong></del></span> <span
class="inserted"><ins><em>inconsistent censorship</a>.</p>
+ </li>
+
+ <li id="M201405250">
+ <p>Apple used this censorship power in 2014 to <a
+
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>procedure</strong></del></span> <span
class="inserted"><ins><em>iThings</em></ins></span> for <span
class="inserted"><ins><em>a time. It also <a
+
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ banned a game about growing marijuana</a>, while permitting games
+ about other crimes such as killing people. Perhaps Apple considers
+ killing more acceptable than marijuana.</p>
+ </li>
+
+ <li id="M201402070">
+ <p>Apple rejected an app that displayed the locations
+ of US drone assassinations, giving various excuses. Each
+ time the developers fixed one “problem”, Apple
+ complained about another. After the fifth rejection, Apple <a
+ href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
<h3 id="pressuring">Apple Pressuring</h3>
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits</em></ins></span> to <span
class="removed"><del><strong>a free format is so tedious</strong></del></span>
<span class="inserted"><ins><em>their use of the software. This section
reports examples of hard sell</em></ins></span> and <span
class="removed"><del><strong>time-consuming that users
just</strong></del></span> <span class="inserted"><ins><em>other unjust
commercial tactics by Apple.</p>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
-<!-- INSERT apple-press -->
<li id="M201510270">
- <p>Apple Siri <a
-
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
- to</em></ins></span> give <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>you information</a> about music
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot
of them.</p></strong></del></span> <span class="inserted"><ins><em>you're
not an Apple
+ <p>Apple Siri</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
+converting images from the Photos format</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</em></ins></span>
+ to <span class="removed"><del><strong>a free format is so tedious
+and time-consuming that users just</strong></del></span> give <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>you information</a> about music
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot
of them.</p></strong></del></span> <span class="inserted"><ins><em>you're
not an Apple
Music subscriber.</p></em></ins></span>
</li>
</ul>
@@ -654,7 +653,6 @@
to <span class="inserted"><ins><em>directly intervene in ways that harm them
or block their work.</p>
<ul class="blurbs">
-<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has</em></ins></span> <a
<span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where</strong></del></span>
@@ -791,7 +789,6 @@
<h3 id="surveillance">Apple Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT apple-surv -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports</em></ins></span>
@@ -1060,7 +1057,6 @@
<li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple</em></ins></span> arbitrarily <a <span
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
blocks</strong></del></span>
@@ -1152,7 +1148,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/malware-apple.es-en.html 10 Oct 2018 11:57:41 -0000 1.53
+++ po/malware-apple.es-en.html 17 Oct 2018 10:01:35 -0000 1.54
@@ -68,7 +68,6 @@
<h3 id="back-doors">Apple Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -109,7 +108,6 @@
<h3 id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
@@ -126,7 +124,6 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
-<!-- INSERT apple-dr -->
<li id="M201704071">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -171,7 +168,6 @@
the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT apple-incompat -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -213,7 +209,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT apple-insec -->
<li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
@@ -271,7 +266,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -383,7 +377,6 @@
<p>Proprietary companies can take advantage of their customers by imposing
arbitrary limits to their use of the software. This section reports examples
of hard sell and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
-<!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
@@ -399,7 +392,6 @@
to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
-<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -494,7 +486,6 @@
<h3 id="surveillance">Apple Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT apple-surv -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -676,7 +667,6 @@
<h3 id="tyrants">Apple Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple arbitrarily <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
@@ -750,7 +740,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 11:57:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/malware-apple.fr-en.html 9 Oct 2018 13:30:40 -0000 1.59
+++ po/malware-apple.fr-en.html 17 Oct 2018 10:01:35 -0000 1.60
@@ -68,7 +68,6 @@
<h3 id="back-doors">Apple Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -109,7 +108,6 @@
<h3 id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
@@ -126,7 +124,6 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
-<!-- INSERT apple-dr -->
<li id="M201704071">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -171,7 +168,6 @@
the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT apple-incompat -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -213,7 +209,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT apple-insec -->
<li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
@@ -271,7 +266,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -383,7 +377,6 @@
<p>Proprietary companies can take advantage of their customers by imposing
arbitrary limits to their use of the software. This section reports examples
of hard sell and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
-<!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
@@ -399,7 +392,6 @@
to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
-<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -494,7 +486,6 @@
<h3 id="surveillance">Apple Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT apple-surv -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -676,7 +667,6 @@
<h3 id="tyrants">Apple Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple arbitrarily <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
@@ -750,7 +740,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/malware-apple.it-diff.html 9 Oct 2018 13:30:40 -0000 1.18
+++ po/malware-apple.it-diff.html 17 Oct 2018 10:01:35 -0000 1.19
@@ -89,7 +89,6 @@
Mac</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -153,7 +152,6 @@
<h3 id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
@@ -169,8 +167,9 @@
by blocking distribution of the LinkedIn app in
Russia</a>.</p></strong></del></span> <span
class="inserted"><ins><em>find</a>.</p></em></ins></span>
<p>This <span class="removed"><del><strong>is ironic because
LinkedIn is</strong></del></span> <span
class="inserted"><ins><em>allows</em></ins></span> a <span
class="removed"><del><strong>surveillance system
-itself. While subjecting its users to its own surveillance, it
tries</strong></del></span> <span class="inserted"><ins><em>company such as
Apple</em></ins></span> to <span class="removed"><del><strong>protect
its</strong></del></span> <span class="inserted"><ins><em>say, “We
allow</em></ins></span> users <span class="removed"><del><strong>from Russian
surveillance, and</strong></del></span>
- <span class="inserted"><ins><em>to turn this off” while ensuring
that few will understand how
+itself. While subjecting its users to its own surveillance, it
tries</strong></del></span> <span class="inserted"><ins><em>company such as
Apple</em></ins></span> to <span class="removed"><del><strong>protect
its</strong></del></span> <span class="inserted"><ins><em>say, “We
allow</em></ins></span> users <span class="removed"><del><strong>from Russian
surveillance, and is therefore
+subject</strong></del></span>
+ to <span class="removed"><del><strong>Russian</strong></del></span> <span
class="inserted"><ins><em>turn this off” while ensuring that few will
understand how
to actually turn it off.</p>
</li>
</ul>
@@ -179,7 +178,6 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
-<!-- INSERT apple-dr -->
<li id="M201704071">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
@@ -224,7 +222,6 @@
the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT apple-incompat -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -266,7 +263,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT apple-insec -->
<li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
@@ -324,7 +320,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -350,8 +345,8 @@
<p>This is ironic because LinkedIn is a surveillance system itself.
While subjecting its users to its own surveillance, it tries to
- protect its users from Russian surveillance, and</em></ins></span> is
therefore subject
- to Russian censorship.</p>
+ protect its users from Russian surveillance, and is therefore subject
+ to Russian</em></ins></span> censorship.</p>
<p>However, the point here is the wrong of Apple's censorship of
apps.</p>
@@ -441,19 +436,19 @@
is bad, whether educating people about drone attacks is bad, are not
the real issue. Apple should not have the power</em></ins></span> to
<span class="removed"><del><strong>render
a certain kind</strong></del></span> <span
class="inserted"><ins><em>impose its views
- about either</em></ins></span> of <span class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these questions, or any
other.</p></em></ins></span>
+ about either of these questions, or any other.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201412110">
+ <li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
+ More examples</em></ins></span> of <span
class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Apple's arbitrary and inconsistent
censorship</a>.</p></em></ins></span>
</li>
- <li id="M201405250">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405250">
<p>Apple used this censorship power</em></ins></span> in <span
class="inserted"><ins><em>2014 to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
ban all bitcoin apps</a> for</em></ins></span> the iThings <span
class="removed"><del><strong>Messages
@@ -494,7 +489,6 @@
<li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple</em></ins></span> Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
@@ -515,7 +509,6 @@
to directly intervene in ways</em></ins></span> that harm <span
class="inserted"><ins><em>them or block their work.</p>
<ul class="blurbs">
-<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -560,24 +553,23 @@
“Unauthorized” essentially means anyone besides
Apple.</p>
<p>The article uses the term “lock”
- to describe the DRM, but we prefer to use the <span
class="removed"><del><strong>term <a
- href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks">
- digital handcuffs</a>.</p></strong></del></span> <span
class="inserted"><ins><em>term <a
- href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
+ to describe the DRM, but we prefer to use the term <a
+ <span
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"></em></ins></span>
digital
handcuffs</a>.</p>
</li>
- <li id="M201606080">
+
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606080">
<p>Apple <a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
stops users from fixing the security bugs in Quicktime for
Windows</a>,
- while refusing to fix them itself.</p></em></ins></span>
+ while refusing to fix them itself.</p>
</li>
-
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605040"></em></ins></span>
+ <li id="M201605040"></em></ins></span>
<p>The Apple Music client program <a
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
the user's file system for music files, copies them to an Apple server,
@@ -642,7 +634,6 @@
<li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-surv -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -748,21 +739,20 @@
remove it themselves.</p>
</li>
- <span class="removed"><del><strong><li><p>Various operations in
- <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
- the latest</strong></del></span>
+ <span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201410300">
- <p></em></ins></span> MacOS <span class="removed"><del><strong>send
reports to Apple</a> servers.</p>
- </li>
-
- <li><p>Spyware in MacOS:</strong></del></span> <span
class="inserted"><ins><em>automatically</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"></em></ins></span>
- sends <span class="removed"><del><strong>users' search
terms</strong></del></span> to <span
class="removed"><del><strong>Apple.</p></strong></del></span> <span
class="inserted"><ins><em>Apple servers unsaved documents being
edited</a>. The
+ <p> MacOS automatically</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ sends to Apple servers unsaved documents being edited</a>. The
things you have not decided to save are <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
- even more sensitive</a> than the things you have stored in
files.</p></em></ins></span>
+ even more sensitive</a> than</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send reports to Apple</a>
servers.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>things you have stored</em></ins></span> in <span
class="removed"><del><strong>MacOS:
+ <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms to
Apple.</p></strong></del></span> <span
class="inserted"><ins><em>files.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Apple</strong></del></span>
@@ -930,7 +920,6 @@
<li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple</em></ins></span> arbitrarily <a <span
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
blocks</strong></del></span>
@@ -1022,7 +1011,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/malware-apple.ja-diff.html 9 Oct 2018 13:30:40 -0000 1.31
+++ po/malware-apple.ja-diff.html 17 Oct 2018 10:01:35 -0000 1.32
@@ -99,7 +99,6 @@
Mac</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -176,7 +175,6 @@
<h3 id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
rights</strong></del></span>
@@ -200,75 +198,74 @@
<ul>
<li>
- <p>A vulnerability in Apple's Image I/O API
allowed</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
<ul class="blurbs">
-<!-- INSERT apple-dr -->
<li id="M201704071">
- <p>DRM makes the iPhone 7 nearly <a
- href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
+ <p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which</strong></del></span>
+ <span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
</li>
<li id="M201512260">
<p><a
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
- Apple uses DRM software to prevent people from charging</em></ins></span>
an <span class="removed"><del><strong>attacker</strong></del></span> <span
class="inserted"><ins><em>iThing
- with a generic USB cable</a>.</p>
+ Apple</em></ins></span> uses <span class="removed"><del><strong>this
API</strong></del></span> <span class="inserted"><ins><em>DRM
software</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
+ with</em></ins></span> a <span class="removed"><del><strong>certain kind
of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>generic USB
cable</a>.</p></em></ins></span>
</li>
- <li id="M200811210">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200811210">
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model of Macbook introduced a
- requirement for monitors to have malicious hardware, but DRM software
+ DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="inserted"><ins><em>MacOS</a>. This article
+ focuses on</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
<span class="inserted"><ins><em>fact that a new model of Macbook
introduced</em></ins></span> a
+ <span class="inserted"><ins><em>requirement for monitors to
have</em></ins></span> malicious <span class="removed"><del><strong>web
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM
software
in MacOS is involved in activating the hardware. The software for
accessing iTunes is also responsible.</p>
</li>
<li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on Windows
- and said that MacOS would do the same thing subsequently.)</p>
+ DRM that caters</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>Bluray disks</a>. (The article focused on
Windows
+ and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>same
thing subsequently.)</p>
</li>
<li id="M200703310">
- <p>iTunes videos have DRM, which allows Apple</em></ins></span> to
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code</strong></del></span>
- <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its
- customers can watch the videos they purchased</a>.</p>
+ <p>iTunes videos have DRM, which allows Apple to <a
+ href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
+ customers can watch the videos they
purchased</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="incompatibility">Apple Incompatibility</h3>
+<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
+<p>Various proprietary</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Apple
Incompatibility</h3>
-<p>In this section, we list characteristics of Apple programs that block
or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching
to</em></ins></span> any <span
class="removed"><del><strong>application</strong></del></span> <span
class="inserted"><ins><em>alternative program—and, in
-particular, from switching to free software</em></ins></span> which <span
class="removed"><del><strong>uses this API</strong></del></span> <span
class="inserted"><ins><em>can liberate the device
+<p>In this section, we list characteristics of Apple</em></ins></span>
programs <span class="removed"><del><strong>often mess up</strong></del></span>
<span class="inserted"><ins><em>that block or
+hinder users from switching to any alternative program—and, in
+particular, from switching to free software which can
liberate</em></ins></span> the <span class="removed"><del><strong>user's
system. They are like sabotage, but</strong></del></span> <span
class="inserted"><ins><em>device
the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT apple-incompat -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
- converting images from the Photos format</a></em></ins></span> to
<span class="removed"><del><strong>render</strong></del></span> a <span
class="removed"><del><strong>certain kind</strong></del></span> <span
class="inserted"><ins><em>free format is so
- tedious and time-consuming that users just give up if they have a
- lot</em></ins></span> of <span class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ converting images from the Photos format</a> to a free format is so
+ tedious and time-consuming that users just give up if</em></ins></span>
they <span class="inserted"><ins><em>have a
+ lot of them.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users</em></ins></span> in <span
class="removed"><del><strong>the iThings Messages
- app</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site</strong></del></span>
- <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>Apple services</a> by being designed to be
incompatible
- with</em></ins></span> all <span class="removed"><del><strong>the user's
messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>other
options, ethical or unethical.</p>
+ <li id="M201802120">
+ <p>Apple devices lock users in <a
+
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being designed to be incompatible
+ with all other options, ethical or unethical.</p>
</li>
<li id="M201605044">
@@ -297,7 +294,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT apple-insec -->
<li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
@@ -355,7 +351,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -430,29 +425,26 @@
<p>This ludicrous rigidity illustrates the point that Apple should
not be allowed to censor apps. Even if Apple carried out this act of
censorship with some care, it would still be wrong. Whether racism
- is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power to impose its views
- about either of these questions, or any other.</p>
+ is bad, whether educating people about drone attacks is
bad,</em></ins></span> are not <span class="removed"><del><strong>grave enough
to qualify
+for</strong></del></span>
+ the <span class="removed"><del><strong>word “sabotage”.
Nonetheless, they are nasty and wrong. This section describes examples
of</strong></del></span> <span class="inserted"><ins><em>real
issue.</em></ins></span> Apple <span class="removed"><del><strong>committing
+interference.</p>
+
+<ul>
+ <li><p>Apple forced millions</strong></del></span> <span
class="inserted"><ins><em>should not have the power to impose its views
+ about either</em></ins></span> of <span
class="removed"><del><strong>iThings</strong></del></span> <span
class="inserted"><ins><em>these questions, or any other.</p>
</li>
<li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p></em></ins></span>
+ More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="interference">Apple Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span>
- <span class="inserted"><ins><em><li id="M201405250">
- <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201405250">
+ <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a></em></ins></span> for the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples of Apple committing
-interference.</p>
-
-<ul>
- <li><p>Apple forced millions of</strong></del></span> iThings
<span class="removed"><del><strong>to download</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> a <span
class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
+ ban all bitcoin apps</a> for the iThings for</em></ins></span> a
<span class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
@@ -478,7 +470,6 @@
<li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple</em></ins></span> Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
@@ -498,7 +489,6 @@
But they are</strong></del></span> <span class="inserted"><ins><em>harm them
or block their work.</p>
<ul class="blurbs">
-<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -617,7 +607,6 @@
<li><p>iPhones</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-surv -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -818,11 +807,11 @@
censor all bitcoin apps</a></strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
for <span class="removed"><del><strong>the iThings.</p>
- <p>Apple, in the iThings, pioneered the practice of
general</strong></del></span> <span class="inserted"><ins><em>no
possible</em></ins></span> purpose
- <span class="removed"><del><strong>computers that are jails, and the term
comes from iThing users, who
+ <p>Apple, in the iThings, pioneered the practice of general purpose
+ computers that are jails, and the term comes from iThing users, who
referred to escaping from the censorship as
“jailbreaking.”</p>
- <p>Here</strong></del></span> <span class="inserted"><ins><em>other
than surveillance</a>. Here</em></ins></span> is <span
class="removed"><del><strong>an article about</strong></del></span> the <a
+ <p>Here</strong></del></span> <span class="inserted"><ins><em>no
possible purpose other than surveillance</a>. Here</em></ins></span> is
<span class="removed"><del><strong>an article about</strong></del></span> the
<a
<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
code signing</a> that</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
@@ -896,7 +885,6 @@
<li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple</em></ins></span> arbitrarily <a <span
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
blocks</strong></del></span>
@@ -988,7 +976,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- po/malware-apple.nl-diff.html 9 Oct 2018 13:30:40 -0000 1.36
+++ po/malware-apple.nl-diff.html 17 Oct 2018 10:01:35 -0000 1.37
@@ -99,7 +99,6 @@
Mac</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -176,7 +175,6 @@
<h3 id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
rights</strong></del></span>
@@ -200,75 +198,74 @@
<ul>
<li>
- <p>A vulnerability in Apple's Image I/O API
allowed</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
<ul class="blurbs">
-<!-- INSERT apple-dr -->
<li id="M201704071">
- <p>DRM makes the iPhone 7 nearly <a
- href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
+ <p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which</strong></del></span>
+ <span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
</li>
<li id="M201512260">
<p><a
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
- Apple uses DRM software to prevent people from charging</em></ins></span>
an <span class="removed"><del><strong>attacker</strong></del></span> <span
class="inserted"><ins><em>iThing
- with a generic USB cable</a>.</p>
+ Apple</em></ins></span> uses <span class="removed"><del><strong>this
API</strong></del></span> <span class="inserted"><ins><em>DRM
software</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
+ with</em></ins></span> a <span class="removed"><del><strong>certain kind
of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>generic USB
cable</a>.</p></em></ins></span>
</li>
- <li id="M200811210">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200811210">
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model of Macbook introduced a
- requirement for monitors to have malicious hardware, but DRM software
+ DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="inserted"><ins><em>MacOS</a>. This article
+ focuses on</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
<span class="inserted"><ins><em>fact that a new model of Macbook
introduced</em></ins></span> a
+ <span class="inserted"><ins><em>requirement for monitors to
have</em></ins></span> malicious <span class="removed"><del><strong>web
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM
software
in MacOS is involved in activating the hardware. The software for
accessing iTunes is also responsible.</p>
</li>
<li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on Windows
- and said that MacOS would do the same thing subsequently.)</p>
+ DRM that caters</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>Bluray disks</a>. (The article focused on
Windows
+ and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>same
thing subsequently.)</p>
</li>
<li id="M200703310">
- <p>iTunes videos have DRM, which allows Apple</em></ins></span> to
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code</strong></del></span>
- <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its
- customers can watch the videos they purchased</a>.</p>
+ <p>iTunes videos have DRM, which allows Apple to <a
+ href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
+ customers can watch the videos they
purchased</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="incompatibility">Apple Incompatibility</h3>
+<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
+<p>Various proprietary</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Apple
Incompatibility</h3>
-<p>In this section, we list characteristics of Apple programs that block
or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching
to</em></ins></span> any <span
class="removed"><del><strong>application</strong></del></span> <span
class="inserted"><ins><em>alternative program—and, in
-particular, from switching to free software</em></ins></span> which <span
class="removed"><del><strong>uses this API</strong></del></span> <span
class="inserted"><ins><em>can liberate the device
+<p>In this section, we list characteristics of Apple</em></ins></span>
programs <span class="removed"><del><strong>often mess up</strong></del></span>
<span class="inserted"><ins><em>that block or
+hinder users from switching to any alternative program—and, in
+particular, from switching to free software which can
liberate</em></ins></span> the <span class="removed"><del><strong>user's
system. They are like sabotage, but</strong></del></span> <span
class="inserted"><ins><em>device
the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT apple-incompat -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
- converting images from the Photos format</a></em></ins></span> to
<span class="removed"><del><strong>render</strong></del></span> a <span
class="removed"><del><strong>certain kind</strong></del></span> <span
class="inserted"><ins><em>free format is so
- tedious and time-consuming that users just give up if they have a
- lot</em></ins></span> of <span class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ converting images from the Photos format</a> to a free format is so
+ tedious and time-consuming that users just give up if</em></ins></span>
they <span class="inserted"><ins><em>have a
+ lot of them.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users</em></ins></span> in <span
class="removed"><del><strong>the iThings Messages
- app</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site</strong></del></span>
- <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>Apple services</a> by being designed to be
incompatible
- with</em></ins></span> all <span class="removed"><del><strong>the user's
messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>other
options, ethical or unethical.</p>
+ <li id="M201802120">
+ <p>Apple devices lock users in <a
+
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being designed to be incompatible
+ with all other options, ethical or unethical.</p>
</li>
<li id="M201605044">
@@ -297,7 +294,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT apple-insec -->
<li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
@@ -355,7 +351,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -430,29 +425,26 @@
<p>This ludicrous rigidity illustrates the point that Apple should
not be allowed to censor apps. Even if Apple carried out this act of
censorship with some care, it would still be wrong. Whether racism
- is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power to impose its views
- about either of these questions, or any other.</p>
+ is bad, whether educating people about drone attacks is
bad,</em></ins></span> are not <span class="removed"><del><strong>grave enough
to qualify
+for</strong></del></span>
+ the <span class="removed"><del><strong>word “sabotage”.
Nonetheless, they are nasty and wrong. This section describes examples
of</strong></del></span> <span class="inserted"><ins><em>real
issue.</em></ins></span> Apple <span class="removed"><del><strong>committing
+interference.</p>
+
+<ul>
+ <li><p>Apple forced millions</strong></del></span> <span
class="inserted"><ins><em>should not have the power to impose its views
+ about either</em></ins></span> of <span
class="removed"><del><strong>iThings</strong></del></span> <span
class="inserted"><ins><em>these questions, or any other.</p>
</li>
<li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p></em></ins></span>
+ More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="interference">Apple Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span>
- <span class="inserted"><ins><em><li id="M201405250">
- <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201405250">
+ <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a></em></ins></span> for the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples of Apple committing
-interference.</p>
-
-<ul>
- <li><p>Apple forced millions of</strong></del></span> iThings
<span class="removed"><del><strong>to download</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> a <span
class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
+ ban all bitcoin apps</a> for the iThings for</em></ins></span> a
<span class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
@@ -478,7 +470,6 @@
<li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple</em></ins></span> Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
@@ -498,7 +489,6 @@
But they are</strong></del></span> <span class="inserted"><ins><em>harm them
or block their work.</p>
<ul class="blurbs">
-<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -617,7 +607,6 @@
<li><p>iPhones</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-surv -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -818,11 +807,11 @@
censor all bitcoin apps</a></strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
for <span class="removed"><del><strong>the iThings.</p>
- <p>Apple, in the iThings, pioneered the practice of
general</strong></del></span> <span class="inserted"><ins><em>no
possible</em></ins></span> purpose
- <span class="removed"><del><strong>computers that are jails, and the term
comes from iThing users, who
+ <p>Apple, in the iThings, pioneered the practice of general purpose
+ computers that are jails, and the term comes from iThing users, who
referred to escaping from the censorship as
“jailbreaking.”</p>
- <p>Here</strong></del></span> <span class="inserted"><ins><em>other
than surveillance</a>. Here</em></ins></span> is <span
class="removed"><del><strong>an article about</strong></del></span> the <a
+ <p>Here</strong></del></span> <span class="inserted"><ins><em>no
possible purpose other than surveillance</a>. Here</em></ins></span> is
<span class="removed"><del><strong>an article about</strong></del></span> the
<a
<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
code signing</a> that</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
@@ -896,7 +885,6 @@
<li><p>Apple</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple</em></ins></span> arbitrarily <a <span
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
blocks</strong></del></span>
@@ -988,7 +976,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/malware-apple.ru-en.html 9 Oct 2018 13:30:41 -0000 1.59
+++ po/malware-apple.ru-en.html 17 Oct 2018 10:01:35 -0000 1.60
@@ -68,7 +68,6 @@
<h3 id="back-doors">Apple Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT apple-back-door -->
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -109,7 +108,6 @@
<h3 id="deception">Apple Deception</h3>
<ul class="blurbs">
-<!-- INSERT apple-decept -->
<li id="M201308290">
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
@@ -126,7 +124,6 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
-<!-- INSERT apple-dr -->
<li id="M201704071">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -171,7 +168,6 @@
the software runs on.</p>
<ul class="blurbs">
-<!-- INSERT apple-incompat -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -213,7 +209,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT apple-insec -->
<li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
@@ -271,7 +266,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple-jail -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -383,7 +377,6 @@
<p>Proprietary companies can take advantage of their customers by imposing
arbitrary limits to their use of the software. This section reports examples
of hard sell and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
-<!-- INSERT apple-press -->
<li id="M201510270">
<p>Apple Siri <a
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
@@ -399,7 +392,6 @@
to directly intervene in ways that harm them or block their work.</p>
<ul class="blurbs">
-<!-- INSERT apple-sab -->
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
@@ -494,7 +486,6 @@
<h3 id="surveillance">Apple Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT apple-surv -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -676,7 +667,6 @@
<h3 id="tyrants">Apple Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT apple-tyrant -->
<li id="M201412010">
<p>Apple arbitrarily <a
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">blocks
@@ -750,7 +740,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-appliances.de-diff.html 9 Oct 2018 13:30:41 -0000 1.11
+++ po/malware-appliances.de-diff.html 17 Oct 2018 10:01:35 -0000 1.12
@@ -72,10 +72,9 @@
<span class="inserted"><ins><em>to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
-<!-- INSERT appliances -->
<li id="M201809260">
<p>Honeywell's “smart” thermostats</em></ins></span>
communicate <span class="removed"><del><strong>with it,
is a surveillance device.</strong></del></span>
@@ -543,103 +542,101 @@
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything</em></ins></span> that <span
class="removed"><del><strong>this</strong></del></span> is <span
class="removed"><del><strong>an “open” platform
so</strong></del></span> <span class="inserted"><ins><em>viewed on them, and
not just broadcasts and
cable</a>. Even if</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>fault</strong></del></span> <span
class="inserted"><ins><em>user's own computer,
- the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>app developers. That is clearly
true</strong></del></span> <span class="inserted"><ins><em>a way to disable the
- surveillance, even</em></ins></span> if <span class="inserted"><ins><em>it
were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
- </li>
-
- <li id="M201612230">
- <p>VR equipment, measuring every slight motion,
- creates the potential for</em></ins></span> the <span
class="removed"><del><strong>apps are proprietary software.</p>
+<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>fault of app developers. That is clearly true
if</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
+ the <span class="removed"><del><strong>apps are proprietary
software.</p>
-<p>Anything whose name is “Smart” is</strong></del></span>
most <span class="removed"><del><strong>likely going</strong></del></span>
<span class="inserted"><ins><em>intimate
- surveillance ever. All it takes</em></ins></span> to
+<p>Anything whose name is “Smart” is most likely
going</strong></del></span> <span class="inserted"><ins><em>TV reports what it
is. The existence of a way</em></ins></span> to
<span class="removed"><del><strong>screw you.</p>
</li>
<li>
<p>
-Malware found on</strong></del></span> <span class="inserted"><ins><em>make
this potential real</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+Malware found on <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.
</p>
-<p>A camera that records locally</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
- software as malicious as many other programs listed in this
- page</a>.</p>
-
- <p>You can bet Facebook will implement the maximum possible
- surveillance</em></ins></span> on <span
class="removed"><del><strong>physical media, and has no network
-connection, does not threaten people</strong></del></span> <span
class="inserted"><ins><em>Oculus Rift devices. The moral is, never trust a VR
- system</em></ins></span> with <span
class="removed"><del><strong>surveillance—neither
-by watching people through the camera, nor through
malware</strong></del></span> <span class="inserted"><ins><em>nonfree
software</em></ins></span> in <span class="removed"><del><strong>the
-camera.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+<p>A camera that records locally on physical media, and has no network
+connection, does not threaten people with surveillance—neither
+by watching people through</strong></del></span> <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>camera, nor through malware</strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
+ does not legitimize</em></ins></span> the
+<span class="removed"><del><strong>camera.</p></strong></del></span>
<span class="inserted"><ins><em>surveillance.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p></strong></del></span>
- <span class="inserted"><ins><em><li id="M201612200">
- <p>The developer of Ham Radio Deluxe</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201612230">
+ <p>VR equipment, measuring every slight motion,
+ creates the potential for the most intimate
+ surveillance ever. All it takes to make this potential
real</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit fitness trackers have</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged</em></ins></span>
- a <span class="removed"><del><strong>Bluetooth vulnerability</a>
that allows
+FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
attackers to send malware to the devices, which can subsequently
-spread to computers and other FitBit trackers that interact with
+spread to computers and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many</em></ins></span> other <span
class="removed"><del><strong>FitBit trackers that interact with
them.</p>
</li>
<li>
-<p> “Self-encrypting” disk drives do the encryption
with</strong></del></span> <span class="inserted"><ins><em>customer's
installation as punishment for posting a negative
- review</a>.</p>
+<p> “Self-encrypting” disk drives do</strong></del></span>
<span class="inserted"><ins><em>programs listed in this
+ page</a>.</p>
- <p>Most</em></ins></span> proprietary <span
class="removed"><del><strong>firmware</strong></del></span> <span
class="inserted"><ins><em>software companies don't use their
power</em></ins></span> so <span class="removed"><del><strong>you can't trust
it. Western Digital's</strong></del></span>
- <span class="inserted"><ins><em>harshly, but it is an injustice that they
all <em>have</em> such
- power.</p>
+ <p>You can bet Facebook will implement</em></ins></span> the <span
class="removed"><del><strong>encryption with
+proprietary firmware so you can't</strong></del></span> <span
class="inserted"><ins><em>maximum possible
+ surveillance on Oculus Rift devices. The moral is, never</em></ins></span>
trust <span class="removed"><del><strong>it. Western Digital's <a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+“My Passport” drives have</strong></del></span> a <span
class="removed"><del><strong>back
door</a>.</p></strong></del></span> <span
class="inserted"><ins><em>VR
+ system with nonfree software in it.</p></em></ins></span>
</li>
- <li id="M201612061">
- <p>The “smart” toys My Friend Cayla and i-Que can
be</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
-“My Passport” drives have</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
- controlled with</em></ins></span> a <span
class="removed"><del><strong>back door</a>.</p>
-</li>
-
-<li>
+<span class="removed"><del><strong><li>
<p>
-Hospira infusion pumps, which are used to administer
drugs</strong></del></span> <span class="inserted"><ins><em>mobile
phone</a>; physical access is not
- necessary. This would enable crackers</em></ins></span> to
-<span class="removed"><del><strong>a patient, were rated “<a
+Hospira infusion pumps, which are used to administer drugs
to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612200">
+ <p>The developer of Ham Radio Deluxe <a
+
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged</em></ins></span>
+ a <span class="removed"><del><strong>patient, were rated “<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
-least secure IP device I've ever seen</a>” by a security
+least secure IP device I've ever seen</a>”
by</strong></del></span> <span class="inserted"><ins><em>customer's
installation as punishment for posting</em></ins></span> a <span
class="removed"><del><strong>security
researcher.</p>
-<p>Depending</strong></del></span> <span
class="inserted"><ins><em>listen in</em></ins></span> on <span
class="removed"><del><strong>what drug is being infused,</strong></del></span>
<span class="inserted"><ins><em>a child's
- conversations, and even speak into</em></ins></span> the <span
class="removed"><del><strong>insecurity</strong></del></span> <span
class="inserted"><ins><em>toys themselves.</p>
+<p>Depending on what drug</strong></del></span> <span
class="inserted"><ins><em>negative
+ review</a>.</p>
- <p>This means a burglar</em></ins></span> could
-<span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>speak into</em></ins></span> the <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>toys and ask the child</em></ins></span>
- to <span
class="removed"><del><strong>murder.</p></strong></del></span> <span
class="inserted"><ins><em>unlock the front door while Mommy's not
looking.</p></em></ins></span>
+ <p>Most proprietary software companies don't use their power so
+ harshly, but it</em></ins></span> is <span
class="removed"><del><strong>being infused, the insecurity could
+open the door to murder.</p></strong></del></span> <span
class="inserted"><ins><em>an injustice that they all <em>have</em>
such
+ power.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Due to bad security in a drug pump, crackers could use it
to</strong></del></span>
+<p>Due</strong></del></span>
- <span class="inserted"><ins><em><li id="M201609200">
- <p>HP's firmware downgrade</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
-kill patients</a>.</p>
-</li>
+ <span class="inserted"><ins><em><li id="M201612061">
+ <p>The “smart” toys My Friend Cayla and i-Que can be
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
+ controlled with a mobile phone</a>; physical access is not
+ necessary. This would enable crackers</em></ins></span> to <span
class="removed"><del><strong>bad security</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> in <span
class="inserted"><ins><em>on</em></ins></span> a <span
class="removed"><del><strong>drug pump, crackers</strong></del></span> <span
class="inserted"><ins><em>child's
+ conversations, and even speak into the toys themselves.</p>
+
+ <p>This means a burglar</em></ins></span> could <span
class="removed"><del><strong>use it</strong></del></span> <span
class="inserted"><ins><em>speak into the toys and ask the
child</em></ins></span>
+ to <span class="removed"><del><strong><a
+href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+kill patients</a>.</p></strong></del></span> <span
class="inserted"><ins><em>unlock the front door while Mommy's not
looking.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
“Smart homes”</a> turn out to be stupidly
vulnerable</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
+
+ <span class="inserted"><ins><em><li id="M201609200">
+ <p>HP's firmware downgrade <a
+
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
DRM on some printers, which now refuse</em></ins></span> to
<span class="removed"><del><strong>intrusion.</p></strong></del></span>
<span class="inserted"><ins><em>function with third-party
ink cartridges</a>.</p></em></ins></span>
@@ -667,96 +664,60 @@
<span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
unauthorized</em></ins></span> people <span
class="removed"><del><strong>by taking</strong></del></span> <span
class="inserted"><ins><em>can remotely</em></ins></span> control <span
class="removed"><del><strong>of medical implants by radio</a>. More
information in <a
-href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
-<a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p>
-</li>
+href="http://www.bbc.co.uk/news/technology-17631838">BBC
News</a></strong></del></span> <span
class="inserted"><ins><em>it</a>.</p>
-<li>
-<p>Lots of <a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>, and it can be fatal.</p>
-</li>
-
-<li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken over</a> and turned
-into a botnet for</strong></del></span> <span
class="inserted"><ins><em>it</a>.</p>
-
- <p>Samsung claims that this is an “open” platform
so</em></ins></span> the <span
class="removed"><del><strong>purpose</strong></del></span>
- <span class="inserted"><ins><em>problem is partly the
fault</em></ins></span> of <span class="removed"><del><strong>collecting
customers' credit card
-numbers.</p></strong></del></span> <span class="inserted"><ins><em>app
developers. That is clearly true
+ <p>Samsung claims that this is an “open” platform so the
+ problem is partly the fault of app developers. That is clearly true
if the apps are proprietary software.</p>
<p>Anything whose name is “Smart” is most likely going
- to screw you.</p></em></ins></span>
+ to screw you.</p>
</li>
- <li <span class="removed"><del><strong>id="vizio-snoop">
-<p>Vizio</strong></del></span> <span
class="inserted"><ins><em>id="M201604110">
- <p>Malware was found on</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
-used a firmware “upgrade” to make its TVs
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+ <li id="M201604110">
+ <p>Malware was found on <a
+
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.</p>
- <p>A camera that records locally</em></ins></span> on <span
class="removed"><del><strong>what
-users watch</a>. The TVs did</strong></del></span> <span
class="inserted"><ins><em>physical media, and has no network
- connection, does</em></ins></span> not <span
class="removed"><del><strong>do that when first
sold.</p></strong></del></span> <span class="inserted"><ins><em>threaten
people with surveillance—neither
+ <p>A camera that records locally on physical
media,</em></ins></span> and <span class="inserted"><ins><em>has no network
+ connection, does not threaten people with surveillance—neither
by watching people through the camera, nor through malware in the
- camera.</p></em></ins></span>
+ camera.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>LG</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201604050">
+ <li id="M201604050">
<p>Google/Alphabet</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
-disabled network features</a></strong></del></span>
+<span
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+IOActive Labs Research blog</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
intentionally broke Revolv home automatic control products that
- depended</em></ins></span> on <span
class="removed"><del><strong><em>previously purchased</em>
-“smart” TVs, unless the purchasers agreed to let LG
-begin</strong></del></span> <span class="inserted"><ins><em>a
server</a></em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>function, by shutting down the server.
- The lesson is, reject all such products. Insist</em></ins></span> on
<span class="removed"><del><strong>them and distribute their personal
data.</p></strong></del></span> <span
class="inserted"><ins><em>self-contained
+ depended on a server</a> to function, by shutting down the server.
+ The lesson is, reject all such products. Insist on self-contained
computers that run free software!</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
-Barbie is going</strong></del></span>
+<p>Lots</strong></del></span>
<span class="inserted"><ins><em><li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>spy</a> on children and adults.</p>
-</li>
-
-<li>
-<p><a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-Cisco TNP IP phones are spying
devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch through
them</a>.</p></em></ins></span>
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601100"></em></ins></span>
+ <li id="M201601100">
<p>The <a
-<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">Nest
Cam
-“smart” camera</strong></del></span>
- <span
class="inserted"><ins><em>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ href="http://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed with DRM</a>: it
- won't accept third-party printing materials. It</em></ins></span> is
<span class="removed"><del><strong>always watching</a>, even
when</strong></del></span> the
-<span class="removed"><del><strong>“owner”
switches</strong></del></span> <span class="inserted"><ins><em>Keurig of
- printers. Now</em></ins></span> it <span
class="removed"><del><strong>“off.”</p></strong></del></span>
<span class="inserted"><ins><em>is being discontinued, which means that
eventually
+ won't accept third-party printing materials. It is the
Keurig</em></ins></span> of
+ <span class="inserted"><ins><em>printers. Now it is being discontinued,
which means that eventually
authorized materials won't be available and the printers may become
unusable.</p>
- <p>With a <a
- href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ <p>With a</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+hospital equipment has lousy security</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
printer that gets the Respects Your Freedom</a>, this problem would
not even be a remote possibility.</p>
@@ -796,9 +757,9 @@
<li id="M201511250">
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches it
“off.”</p></em></ins></span>
+ even when the “owner” switches it “off.”</p>
- <p>A “smart” <span class="removed"><del><strong>device
means</strong></del></span> <span class="inserted"><ins><em>device means the
manufacturer is using it
+ <p>A “smart” device means the manufacturer is using it
to outsmart you.</p>
</li>
@@ -872,29 +833,38 @@
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>it can be fatal.</p></strong></del></span>
<span class="inserted"><ins><em>even what they wanted to
+ record</a>.</p></em></ins></span>
</li>
- <li id="M201505050">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505050">
<p>Hospira infusion pumps, which are used
- to administer drugs to a patient, were rated “<a
+ to administer drugs to a patient,</em></ins></span> were <span
class="removed"><del><strong>taken over</a> and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated “<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
- secure IP device I've ever seen</a>” by a security
+ secure IP device I've ever seen</a>” by</em></ins></span> a
<span class="removed"><del><strong>botnet for</strong></del></span> <span
class="inserted"><ins><em>security
researcher.</p>
- <p>Depending on what drug is being infused, the insecurity could open
- the door to murder.</p>
+ <p>Depending on what drug is being infused,</em></ins></span> the
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.</p></strong></del></span> <span
class="inserted"><ins><em>insecurity could open
+ the door to murder.</p></em></ins></span>
</li>
- <li id="M201504300">
+ <li <span
class="removed"><del><strong>id="vizio-snoop"></strong></del></span> <span
class="inserted"><ins><em>id="M201504300"></em></ins></span>
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <li id="M201502180">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
@@ -946,34 +916,54 @@
data about the user</a>.</p>
</li>
- <li id="M201405201">
+ <li id="M201405201"></em></ins></span>
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously
purchased</em>
- “smart” TVs, unless</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>purchasers agreed</em></ins></span> to <span
class="removed"><del><strong>outsmart
-you.</p>
+ “smart” TVs, unless the purchasers agreed to let LG begin
+ to snoop on them and distribute their personal data.</p>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
+Barbie is going to spy</a> on children and adults.</p>
</li>
<li>
-<p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>let LG begin
- to snoop</em></ins></span> on <span class="inserted"><ins><em>them and
distribute</em></ins></span> their <span class="removed"><del><strong>users:
their</strong></del></span> <span class="inserted"><ins><em>personal
data.</p>
- </li>
+<p><a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+Cisco TNP IP phones are spying devices</a>.</p>
+</li>
+
+<li>
+<p>The</strong></del></span>
- <li id="M201404250">
+ <span class="inserted"><ins><em><li id="M201404250">
<p>Lots of</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
-“smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>,</em></ins></span> and
-<span class="removed"><del><strong>link them your IP address</a> so that
advertisers</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> can <span
class="removed"><del><strong>track you
-across devices.</p>
+<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">Nest
Cam
+“smart” camera is always watching</a>, even when the
+“owner” switches it “off.”</p>
-<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>be fatal.</p>
+<p>A “smart” device means the manufacturer is
using</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ hospital equipment has lousy security</a>, and</em></ins></span> it
<span class="removed"><del><strong>to outsmart
+you.</p></strong></del></span> <span class="inserted"><ins><em>can be
fatal.</p></em></ins></span>
</li>
- <li id="M201312290">
+<span class="removed"><del><strong><li>
+<p>Vizio goes a step further than other TV manufacturers in spying on
+their users: their <a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+“smart” TVs analyze your viewing habits in detail and
+link</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312290">
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
- memories have modifiable software</a>, which makes them
vulnerable</em></ins></span>
+ memories have modifiable software</a>, which makes</em></ins></span>
them <span class="removed"><del><strong>your IP address</a> so that
advertisers can track you
+across devices.</p>
+
+<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>vulnerable</em></ins></span>
to <span class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>viruses.</p>
<p>We don't call</em></ins></span> this <span
class="removed"><del><strong>off, but having</strong></del></span> <span
class="inserted"><ins><em>a “back door” because</em></ins></span>
it <span class="removed"><del><strong>enabled by default</strong></del></span>
is <span class="removed"><del><strong>an injustice already.</p>
@@ -1218,7 +1208,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/malware-appliances.fr-en.html 9 Oct 2018 13:30:41 -0000 1.44
+++ po/malware-appliances.fr-en.html 17 Oct 2018 10:01:35 -0000 1.45
@@ -42,10 +42,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
-<!-- INSERT appliances -->
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -797,7 +796,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- po/malware-appliances.ru-en.html 9 Oct 2018 13:30:41 -0000 1.45
+++ po/malware-appliances.ru-en.html 17 Oct 2018 10:01:35 -0000 1.46
@@ -42,10 +42,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
-<!-- INSERT appliances -->
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -797,7 +796,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-cars.de-diff.html 9 Oct 2018 13:30:41 -0000 1.6
+++ po/malware-cars.de-diff.html 17 Oct 2018 10:01:35 -0000 1.7
@@ -60,10 +60,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
-<!-- INSERT cars -->
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -341,7 +340,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-cars.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/malware-cars.fr-en.html 9 Oct 2018 13:30:41 -0000 1.7
+++ po/malware-cars.fr-en.html 17 Oct 2018 10:01:35 -0000 1.8
@@ -42,10 +42,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
-<!-- INSERT cars -->
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -261,7 +260,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-cars.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/malware-cars.ru-en.html 9 Oct 2018 13:30:41 -0000 1.8
+++ po/malware-cars.ru-en.html 17 Oct 2018 10:01:35 -0000 1.9
@@ -42,10 +42,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
-<!-- INSERT cars -->
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -261,7 +260,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/malware-games.fr-en.html 14 Oct 2018 12:58:19 -0000 1.15
+++ po/malware-games.fr-en.html 17 Oct 2018 10:01:35 -0000 1.16
@@ -42,10 +42,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
<ul class="blurbs">
-<!-- INSERT games -->
<li id="M201807310">
<p>A nonfree video game, available through the nonfree Steam client, <a
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
@@ -259,7 +258,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-games.ja-diff.html 14 Oct 2018 09:30:25 -0000 1.12
+++ po/malware-games.ja-diff.html 17 Oct 2018 10:01:35 -0000 1.13
@@ -60,10 +60,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
<ul class="blurbs">
-<!-- INSERT games -->
<li id="M201807310">
<p>A nonfree video game, available through the nonfree Steam client,
<a
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
@@ -294,7 +293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 09:30:25 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/malware-games.ru-en.html 14 Oct 2018 09:58:12 -0000 1.15
+++ po/malware-games.ru-en.html 17 Oct 2018 10:01:35 -0000 1.16
@@ -42,10 +42,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
<ul class="blurbs">
-<!-- INSERT games -->
<li id="M201807310">
<p>A nonfree video game, available through the nonfree Steam client, <a
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
@@ -259,7 +258,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/malware-google.fr-en.html 9 Oct 2018 13:30:41 -0000 1.24
+++ po/malware-google.fr-en.html 17 Oct 2018 10:01:35 -0000 1.25
@@ -65,7 +65,6 @@
<h3 id="back-doors">Google Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT google-back-door -->
<li id="M201809140">
<p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -109,7 +108,6 @@
<h3 id="censorship">Google Censorship</h3>
<ul class="blurbs">
-<!-- INSERT google-censor -->
<li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
@@ -151,7 +149,6 @@
<h3 id="drm">Google DRM</h3>
<ul class="blurbs">
-<!-- INSERT google-dr -->
<li id="M201705150">
<p>Google now allows Android
apps to detect whether a device has been rooted, <a
@@ -193,7 +190,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT google-insec -->
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
@@ -216,7 +212,6 @@
actions that harm the users of specific Google software.</p>
<ul class="blurbs">
-<!-- INSERT google-sab -->
<li id="M201605150">
<p>Revolv is an IoT device which managed “smart home”
operations: switching the lights, operate motion sensors, regulating
@@ -254,7 +249,6 @@
<h3 id="surveillance">Google Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT google-surv -->
<li id="M201808030">
<p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
@@ -373,7 +367,6 @@
<h3 id="tyrants">Google Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT google-tyrant -->
<li id="M201304080">
<p>Motorola, then owned by Google, made <a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
@@ -441,7 +434,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-google.ru-en.html 9 Oct 2018 13:30:41 -0000 1.25
+++ po/malware-google.ru-en.html 17 Oct 2018 10:01:35 -0000 1.26
@@ -65,7 +65,6 @@
<h3 id="back-doors">Google Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT google-back-door -->
<li id="M201809140">
<p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -109,7 +108,6 @@
<h3 id="censorship">Google Censorship</h3>
<ul class="blurbs">
-<!-- INSERT google-censor -->
<li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
@@ -151,7 +149,6 @@
<h3 id="drm">Google DRM</h3>
<ul class="blurbs">
-<!-- INSERT google-dr -->
<li id="M201705150">
<p>Google now allows Android
apps to detect whether a device has been rooted, <a
@@ -193,7 +190,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT google-insec -->
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
@@ -216,7 +212,6 @@
actions that harm the users of specific Google software.</p>
<ul class="blurbs">
-<!-- INSERT google-sab -->
<li id="M201605150">
<p>Revolv is an IoT device which managed “smart home”
operations: switching the lights, operate motion sensors, regulating
@@ -254,7 +249,6 @@
<h3 id="surveillance">Google Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT google-surv -->
<li id="M201808030">
<p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
@@ -373,7 +367,6 @@
<h3 id="tyrants">Google Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT google-tyrant -->
<li id="M201304080">
<p>Motorola, then owned by Google, made <a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
@@ -441,7 +434,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/malware-microsoft.de-diff.html 10 Oct 2018 07:58:35 -0000 1.15
+++ po/malware-microsoft.de-diff.html 17 Oct 2018 10:01:35 -0000 1.16
@@ -90,7 +90,6 @@
<li><p>Microsoft</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-back-door -->
<li id="M201608172">
<p id="windows-update">Microsoft</em></ins></span>
Windows has a universal back door through which <a
@@ -157,8 +156,7 @@
<h3 id="drm">Microsoft DRM</h3>
-<ul class="blurbs">
-<!-- INSERT microsoft-dr --></em></ins></span>
+<ul class="blurbs"></em></ins></span>
<li <span
class="removed"><del><strong>id="windows7-back-door"><p>Users reported
that <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft was forcing them to replace Windows 7 and 8 with all-spying
@@ -177,8 +175,8 @@
<span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray">Bluray</a>
disks.
(The article talks about</em></ins></span> how <span
class="removed"><del><strong>to permanently reject</strong></del></span> the
<span class="removed"><del><strong>downgrade to Windows 10</a>.</p>
- <p>This seems to involve use of a back door</strong></del></span>
<span class="inserted"><ins><em>same malware would later be
- introduced</em></ins></span> in <span class="removed"><del><strong>Windows
7 and 8.</p></strong></del></span> <span class="inserted"><ins><em>MacOS.
That had not been done at the time, but it was
+ <p>This seems to involve use of a back door in Windows 7 and
8.</p></strong></del></span> <span class="inserted"><ins><em>same malware
would later be
+ introduced in MacOS. That had not been done at the time, but it was
done subsequently.)</p></em></ins></span>
</li>
</ul>
@@ -196,7 +194,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-insec -->
<li id="M201705120"></em></ins></span>
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
@@ -244,7 +241,6 @@
<li><p></strong></del></span> <span
class="inserted"><ins><em>committing interference.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-interf -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -289,23 +285,24 @@
<span class="inserted"><ins><em>“upgrade”</em></ins></span> to
Windows <span class="removed"><del><strong>10</a>.</p>
</li>
- <li><p>Once</strong></del></span> <span
class="inserted"><ins><em>10</a> when they had turned
- it off, in the hope that some day they would fail to say no.
- To do this,</em></ins></span> Microsoft <span
class="removed"><del><strong>has tricked a user into accepting
installation</strong></del></span> <span class="inserted"><ins><em>used <a
+ <li><p>Once Microsoft has tricked a user into accepting
installation
+ of Windows
+ 10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+ find</strong></del></span> <span class="inserted"><ins><em>10</a>
when they had turned
+ it off, in the hope</em></ins></span> that <span
class="inserted"><ins><em>some day</em></ins></span> they <span
class="removed"><del><strong>are denied</strong></del></span> <span
class="inserted"><ins><em>would fail to say no.
+ To do this, Microsoft used <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
<p>A detailed <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
- analysis</em></ins></span> of <span class="inserted"><ins><em>Microsoft's
scheme</a> is available on the Electronic
+ analysis of Microsoft's scheme</a> is available on</em></ins></span>
the <span class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>Electronic
Frontier Foundation's website.</p>
</li>
<li id="M201603090">
- <p>Microsoft has made companies'</em></ins></span>
- Windows
- <span class="removed"><del><strong>10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied</strong></del></span> <span
class="inserted"><ins><em>machines managed by</em></ins></span> the <span
class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>company's sysadmins <a
+ <p>Microsoft has made companies'
+ Windows machines managed by the company's sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
users to complain</em></ins></span> to <span
class="removed"><del><strong>cancel or even postpone</strong></del></span> the
<span class="removed"><del><strong>imposed date of installation</a>.
@@ -377,7 +374,6 @@
<li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"></strong></del></span>
<span class="inserted"><ins><em>specific</em></ins></span> Microsoft <span
class="removed"><del><strong>cut off security fixes for</strong></del></span>
<span class="inserted"><ins><em>software.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-sab -->
<li id="M201704194">
<p>Microsoft has made</em></ins></span> Windows <span
class="removed"><del><strong>XP, except</strong></del></span> <span
class="inserted"><ins><em>7
and 8 cease</em></ins></span> to <span class="removed"><del><strong>some
big users
@@ -385,37 +381,43 @@
<p>Microsoft is going</strong></del></span> <span
class="inserted"><ins><em>function on certain new computers, <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
- forcing their owners</em></ins></span> to <span
class="inserted"><ins><em>switch to Windows 10</a>.</p>
+ forcing their owners to switch</em></ins></span> to <span
class="inserted"><ins><em>Windows 10</a>.</p>
</li>
<li id="M201704134">
<p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
cut off</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped</em></ins></span> support for <span
class="removed"><del><strong>some Internet Explorer
versions</a></strong></del></span> <span
class="inserted"><ins><em>Windows 7 and 8 on recent
processors</a></em></ins></span>
- in <span class="removed"><del><strong>the same way.</p>
+ has dropped</em></ins></span> support for <span
class="removed"><del><strong>some Internet Explorer versions</a> in the
same way.</p>
- <p>A person or company has the right</strong></del></span> <span
class="inserted"><ins><em>a big hurry.</p>
+ <p>A person or company has the right to cease to
work</strong></del></span> <span class="inserted"><ins><em>Windows 7 and
8</em></ins></span> on <span class="inserted"><ins><em>recent
processors</a>
+ in</em></ins></span> a
+ <span class="removed"><del><strong>particular program; the wrong here
is</strong></del></span> <span class="inserted"><ins><em>big hurry.</p>
- <p>It makes no difference what legitimate reasons Microsoft might
- have for not doing work</em></ins></span> to <span
class="removed"><del><strong>cease</strong></del></span> <span
class="inserted"><ins><em>support them. If it doesn't want</em></ins></span> to
<span class="removed"><del><strong>work on a
- particular program;</strong></del></span> <span class="inserted"><ins><em>do
- this work, it should let users do</em></ins></span> the <span
class="removed"><del><strong>wrong here is</strong></del></span> <span
class="inserted"><ins><em>work.</p>
+ <p>It makes no difference what legitimate reasons</em></ins></span>
Microsoft <span class="removed"><del><strong>does</strong></del></span> <span
class="inserted"><ins><em>might
+ have for not doing work to support them. If it doesn't want to
do</em></ins></span>
+ this <span class="removed"><del><strong>after having
+ made the</strong></del></span> <span class="inserted"><ins><em>work, it
should let</em></ins></span> users <span class="removed"><del><strong>dependent
on Microsoft, because they are not free</strong></del></span> <span
class="inserted"><ins><em>do the work.</p>
</li>
<li id="M201606270">
- <p id="windows10-forcing">In its efforts to trick users of Windows
+ <p id="windows10-forcing">In its efforts</em></ins></span> to <span
class="removed"><del><strong>ask
+ anyone else</strong></del></span> <span class="inserted"><ins><em>trick
users of Windows
7 and 8 into installing all-spying Windows 10 against their
- will,</em></ins></span> Microsoft <span
class="removed"><del><strong>does</strong></del></span> <span
class="inserted"><ins><em>forced their computers to <a
+ will, Microsoft forced their computers</em></ins></span> to <span
class="removed"><del><strong>work on</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
- silently download… the whole of Windows 10</a>!
Apparently,</em></ins></span>
- this <span class="removed"><del><strong>after having
- made</strong></del></span> <span class="inserted"><ins><em>was done through
a <a
+ silently download…</em></ins></span> the <span
class="removed"><del><strong>program for them.</p></li>
+</ul>
+
+<h3 id="interference">Microsoft Interference</h3>
+
+<p>Various proprietary programs often mess up</strong></del></span>
<span class="inserted"><ins><em>whole of Windows 10</a>! Apparently,
+ this was done through a <a
href="/proprietary/proprietary-back-doors.html#windows-update">
- universal back door</a>. Not only did</em></ins></span> the <span
class="removed"><del><strong>users dependent on Microsoft,
because</strong></del></span> <span class="inserted"><ins><em>unwanted
downloads <a
+ universal back door</a>. Not only did</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like
sabotage,</strong></del></span> <span class="inserted"><ins><em>unwanted
downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
jeopardize important operations in regions of the world with poor
- connectivity</a>, but many of the people who let installation proceed
+ connectivity</a>,</em></ins></span> but <span
class="inserted"><ins><em>many of the people who let installation proceed
found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
@@ -425,34 +427,29 @@
<p>Once Microsoft has tricked a user
into accepting installation of Windows 10, <a
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that</em></ins></span> they are <span
class="removed"><del><strong>not free to ask
- anyone else</strong></del></span> <span class="inserted"><ins><em>denied the
option</em></ins></span> to <span class="removed"><del><strong>work
on</strong></del></span> <span class="inserted"><ins><em>cancel or even
postpone</em></ins></span> the <span
class="removed"><del><strong>program</strong></del></span>
- <span class="inserted"><ins><em>imposed date of
installation</a>.</p>
-
- <p>This demonstrates what we've said</em></ins></span> for <span
class="removed"><del><strong>them.</p></li>
-</ul>
+ find that</em></ins></span> they are <span
class="removed"><del><strong>not grave enough</strong></del></span> <span
class="inserted"><ins><em>denied the option</em></ins></span> to <span
class="removed"><del><strong>qualify
+for</strong></del></span> <span class="inserted"><ins><em>cancel or even
postpone</em></ins></span> the <span class="removed"><del><strong>word
“sabotage”. Nonetheless, they are nasty and wrong. This section
describes examples</strong></del></span>
+ <span class="inserted"><ins><em>imposed date</em></ins></span> of <span
class="removed"><del><strong>Microsoft committing
+interference.</p>
-<h3 id="interference">Microsoft Interference</h3>
+<ul>
+ <li><p>Microsoft is planning</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
-<p>Various</strong></del></span> <span class="inserted"><ins><em>years:
using</em></ins></span> proprietary <span class="removed"><del><strong>programs
often mess up the user's system. They are like sabotage, but they are not grave
enough</strong></del></span>
- <span class="inserted"><ins><em>software means letting someone have power
over you, and you're going</em></ins></span>
- to <span class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em>get screwed sooner or later.</p>
+ <p>This demonstrates what we've said for years: using proprietary
+ software means letting someone have power over you, and you're
going</em></ins></span>
+ to <span class="removed"><del><strong>make Windows <a
+
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
+ impose use of</strong></del></span> <span class="inserted"><ins><em>get
screwed sooner or later.</p>
</li>
<li id="M201601310">
- <p>FTDI's proprietary driver</em></ins></span>
- for <span class="removed"><del><strong>the word “sabotage”.
Nonetheless,</strong></del></span> <span class="inserted"><ins><em>its
USB-to-serial chips has been designed to <a
+ <p>FTDI's proprietary driver
+ for</em></ins></span> its <span class="removed"><del><strong>browser,
Edge, in certain circumstances</a>.</p>
+ <p>The reason</strong></del></span> <span
class="inserted"><ins><em>USB-to-serial chips has been designed to <a
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
- so that</em></ins></span> they <span class="removed"><del><strong>are
nasty and wrong. This section describes examples of</strong></del></span> <span
class="inserted"><ins><em>no longer work.</em></ins></span> Microsoft <span
class="removed"><del><strong>committing
-interference.</p>
-
-<ul>
- <li><p>Microsoft</strong></del></span> is <span
class="removed"><del><strong>planning to make Windows</strong></del></span>
<a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
- impose use of its browser, Edge, in certain
circumstances</a>.</p>
- <p>The reason Microsoft can force things on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
+ so that they no longer work.</em></ins></span> Microsoft <span
class="removed"><del><strong>can force things on</strong></del></span> <span
class="inserted"><ins><em>is <a
+
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
this automatically</a> as an “upgrade”.</p>
</li>
@@ -509,7 +506,6 @@
<h3 id="subscriptions">Microsoft Subscriptions</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-subscript -->
<li id="M201507150">
<p>Microsoft Office forces</em></ins></span> users <span
class="removed"><del><strong>obnoxiously and repeatedly to install Windows
10</a>.</p></li>
@@ -538,7 +534,6 @@
<li><p>Windows</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-surv -->
<li id="M201710134">
<p>Windows</em></ins></span> 10 telemetry program sends information
to Microsoft about
the user's computer and their use of the computer.</p>
@@ -622,11 +617,11 @@
<p><a
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
Windows 10 <span class="removed"><del><strong>comes with 13 screens of
snooping options</a>, all enabled by default,
- and turning them</strong></del></span> <span class="inserted"><ins><em>sends
identifiable information to Microsoft</a>, even if
- a user turns</em></ins></span> off <span
class="removed"><del><strong>would be daunting to most
users.</p></li>
+ and turning them off would be daunting</strong></del></span> <span
class="inserted"><ins><em>sends identifiable information</em></ins></span> to
<span class="removed"><del><strong>most users.</p></li>
<li><p>
- Windows</strong></del></span> <span class="inserted"><ins><em>its Bing
search and Cortana features, and activates
+ Windows</strong></del></span> <span
class="inserted"><ins><em>Microsoft</a>, even if
+ a user turns off its Bing search and Cortana features, and activates
the privacy-protection settings.</p>
</li>
@@ -748,7 +743,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-jail -->
<li id="M201706130"></em></ins></span>
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -779,7 +773,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-tyrant -->
<li id="M201607150"></em></ins></span>
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -871,7 +864,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 07:58:35 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/malware-microsoft.fr-en.html 10 Oct 2018 10:57:51 -0000 1.60
+++ po/malware-microsoft.fr-en.html 17 Oct 2018 10:01:35 -0000 1.61
@@ -67,7 +67,6 @@
<h3 id="back-doors">Microsoft Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-back-door -->
<li id="M201608172">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
@@ -126,7 +125,6 @@
<h3 id="drm">Microsoft DRM</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-dr -->
<li id="M200708131">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
@@ -146,7 +144,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-insec -->
<li id="M201705120">
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
@@ -180,7 +177,6 @@
section describes examples of Microsoft committing interference.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-interf -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -261,7 +257,6 @@
actions that harm the users of specific Microsoft software.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-sab -->
<li id="M201704194">
<p>Microsoft has made Windows 7
and 8 cease to function on certain new computers, <a
@@ -353,7 +348,6 @@
<h3 id="subscriptions">Microsoft Subscriptions</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-subscript -->
<li id="M201507150">
<p>Microsoft Office forces users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
@@ -365,7 +359,6 @@
<h3 id="surveillance">Microsoft Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-surv -->
<li id="M201710134">
<p>Windows 10 telemetry program sends information to Microsoft about
the user's computer and their use of the computer.</p>
@@ -513,7 +506,6 @@
<h3 id="jails">Microsoft Jails</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-jail -->
<li id="M201706130">
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -539,7 +531,6 @@
<h3 id="tyrants">Microsoft Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-tyrant -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -617,7 +608,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 10:57:51 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- po/malware-microsoft.it-diff.html 10 Oct 2018 07:58:35 -0000 1.14
+++ po/malware-microsoft.it-diff.html 17 Oct 2018 10:01:35 -0000 1.15
@@ -89,7 +89,6 @@
<li><p>Microsoft</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-back-door -->
<li id="M201608172">
<p id="windows-update">Microsoft</em></ins></span>
Windows has a universal back door through which <a
@@ -156,8 +155,7 @@
<h3 id="drm">Microsoft DRM</h3>
-<ul class="blurbs">
-<!-- INSERT microsoft-dr --></em></ins></span>
+<ul class="blurbs"></em></ins></span>
<li <span
class="removed"><del><strong>id="windows7-back-door"><p>Users reported
that <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft was forcing them to replace Windows 7 and 8 with all-spying
@@ -176,8 +174,8 @@
<span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray">Bluray</a>
disks.
(The article talks about</em></ins></span> how <span
class="removed"><del><strong>to permanently reject</strong></del></span> the
<span class="removed"><del><strong>downgrade to Windows 10</a>.</p>
- <p>This seems to involve use of a back door</strong></del></span>
<span class="inserted"><ins><em>same malware would later be
- introduced</em></ins></span> in <span class="removed"><del><strong>Windows
7 and 8.</p></strong></del></span> <span class="inserted"><ins><em>MacOS.
That had not been done at the time, but it was
+ <p>This seems to involve use of a back door in Windows 7 and
8.</p></strong></del></span> <span class="inserted"><ins><em>same malware
would later be
+ introduced in MacOS. That had not been done at the time, but it was
done subsequently.)</p></em></ins></span>
</li>
</ul>
@@ -195,7 +193,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-insec -->
<li id="M201705120"></em></ins></span>
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
@@ -243,7 +240,6 @@
<li><p></strong></del></span> <span
class="inserted"><ins><em>committing interference.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-interf -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -377,7 +373,6 @@
<li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"></strong></del></span>
<span class="inserted"><ins><em>specific</em></ins></span> Microsoft <span
class="removed"><del><strong>cut off security fixes for</strong></del></span>
<span class="inserted"><ins><em>software.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-sab -->
<li id="M201704194">
<p>Microsoft has made</em></ins></span> Windows <span
class="removed"><del><strong>XP, except</strong></del></span> <span
class="inserted"><ins><em>7
and 8 cease</em></ins></span> to <span class="removed"><del><strong>some
big users
@@ -392,123 +387,122 @@
<p>Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
cut off</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped</em></ins></span> support for <span
class="removed"><del><strong>some Internet Explorer versions</a> in the
same way.</p>
-
- <p>A person or company has the right to cease to
work</strong></del></span> <span class="inserted"><ins><em>Windows 7 and
8</em></ins></span> on <span class="inserted"><ins><em>recent
processors</a>
- in</em></ins></span> a
- <span class="removed"><del><strong>particular program; the wrong here
is</strong></del></span> <span class="inserted"><ins><em>big hurry.</p>
-
- <p>It makes no difference what legitimate reasons</em></ins></span>
Microsoft <span class="removed"><del><strong>does this after having
- made the users dependent on Microsoft, because they
are</strong></del></span> <span class="inserted"><ins><em>might
- have for</em></ins></span> not <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>doing work</em></ins></span> to <span
class="removed"><del><strong>ask
- anyone else</strong></del></span> <span class="inserted"><ins><em>support
them. If it doesn't want</em></ins></span> to <span
class="removed"><del><strong>work on the program for them.</p></li>
-</ul>
+ has dropped</em></ins></span> support for <span
class="removed"><del><strong>some Internet Explorer
versions</a></strong></del></span> <span
class="inserted"><ins><em>Windows 7 and 8 on recent
processors</a></em></ins></span>
+ in <span class="removed"><del><strong>the same
way.</p></strong></del></span> <span class="inserted"><ins><em>a big
hurry.</p>
-<h3 id="interference">Microsoft Interference</h3>
-
-<p>Various proprietary programs often mess up</strong></del></span>
<span class="inserted"><ins><em>do
- this work, it should let users do</em></ins></span> the <span
class="removed"><del><strong>user's system. They are like sabotage, but they
are not grave enough</strong></del></span> <span
class="inserted"><ins><em>work.</p>
+ <p>It makes no difference what legitimate reasons Microsoft might
+ have for not doing work to support them. If it doesn't want to do
+ this work, it should let users do the work.</p>
</li>
<li id="M201606270">
- <p id="windows10-forcing">In its efforts</em></ins></span> to <span
class="removed"><del><strong>qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples</strong></del></span> <span
class="inserted"><ins><em>trick users</em></ins></span> of <span
class="inserted"><ins><em>Windows
+ <p id="windows10-forcing">In its efforts to trick users of Windows
7 and 8 into installing all-spying Windows 10 against their
- will,</em></ins></span> Microsoft <span
class="removed"><del><strong>committing
-interference.</p>
-
-<ul>
- <li><p>Windows displays</strong></del></span> <span
class="inserted"><ins><em>forced their computers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
- intrusive ads for Microsoft products and its
- partners' products</a>.</p>
- <p>The article's author starts from</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
- silently download…</em></ins></span> the <span
class="removed"><del><strong>premise</strong></del></span> <span
class="inserted"><ins><em>whole of Windows 10</a>! Apparently,
+ will, Microsoft forced their computers to <a
+
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
+ silently download… the whole of Windows 10</a>! Apparently,
this was done through a <a
href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
jeopardize important operations in regions of the world with poor
connectivity</a>, but many of the people who let installation proceed
- found out</em></ins></span> that <span class="inserted"><ins><em>this
“upgrade” was in fact a <a
+ found out that this “upgrade” was in fact a <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
downgrade</a>.</p>
</li>
<li id="M201606010">
- <p>Once</em></ins></span> Microsoft has <span
class="inserted"><ins><em>tricked</em></ins></span> a <span
class="removed"><del><strong>right to control what</strong></del></span> <span
class="inserted"><ins><em>user
- into accepting installation of</em></ins></span> Windows <span
class="removed"><del><strong>does to users, as long as it
- doesn't go “too far”. We disagree.</p></li>
-
- <li><p>Microsoft inserts</strong></del></span> <span
class="inserted"><ins><em>10,</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
- annoying advertisements inside of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied</em></ins></span> the <span
class="removed"><del><strong>File Explorer</a></strong></del></span>
<span class="inserted"><ins><em>option</em></ins></span> to <span
class="removed"><del><strong>nag
- users</strong></del></span> <span class="inserted"><ins><em>cancel or
even postpone the
+ <p>Once Microsoft has tricked a user
+ into accepting installation of Windows 10, <a
+
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+ find that they are denied the option to cancel or even postpone the
imposed date of installation</a>.</p>
<p>This demonstrates what we've said for years: using proprietary
- software means letting someone have power over you, and you're
going</em></ins></span>
- to <span class="removed"><del><strong>buy
subscriptions</strong></del></span> <span class="inserted"><ins><em>get screwed
sooner or later.</p>
+ software means letting someone have power over you, and you're going
+ to get screwed sooner or later.</p>
</li>
<li id="M201601310">
- <p>FTDI's proprietary driver</em></ins></span>
- for <span class="removed"><del><strong>the OneDrive
service.</p></li>
-
-<li>In order</strong></del></span> <span class="inserted"><ins><em>its
USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>increase Windows 10's install
base,</strong></del></span> <span class="inserted"><ins><em><a
+ <p>FTDI's proprietary driver
+ for its USB-to-serial chips has been designed to <a
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
- so that they no longer work.</em></ins></span> Microsoft <span
class="inserted"><ins><em>is</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice and privacy</a>.</strong></del></span>
- <span
class="inserted"><ins><em>href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
- this automatically</a> as an
“upgrade”.</p></em></ins></span>
+ so that they no longer work. Microsoft is <a
+
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
+ this automatically</a> as an “upgrade”.</p>
</li>
-<span class="removed"><del><strong><li><p>Microsoft has
-started</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511240">
- <p>Windows 10 “upgrades”</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
+ <li id="M201511240">
+ <p>Windows 10 “upgrades” <a
+
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
delete applications</a> without asking permission.</p>
</li>
<li id="M201503260">
<p><a
href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/">Microsoft
- cut off security fixes for Windows XP, except to some
big</em></ins></span> users <span class="removed"><del><strong>obnoxiously and
repeatedly</strong></del></span> <span class="inserted"><ins><em>that
+ cut off security fixes for Windows XP, except to some big users that
pay exorbitantly</a>.</p>
- <p>Microsoft is going</em></ins></span> to <span
class="removed"><del><strong>install Windows 10</a>.</p></li>
+ <p>Microsoft is going to <a
+
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/">
+ cut off support for some Internet Explorer versions</a> in the same
+ way.</p></em></ins></span>
- <li><p>Microsoft
- <a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
- tricking
- users</a></strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
-into replacing Windows 7 with Windows 10</a>.</p></li>
+ <p>A person or company has the right to cease to work on a particular
+ program; the wrong here is Microsoft does this after having made the
+ users dependent on Microsoft, because they are not free to ask anyone
+ else to work on the program for <span
class="removed"><del><strong>them.</p></li>
+</ul>
- <li><p>Microsoft</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/">
- cut off support for some Internet Explorer versions</a> in the same
- way.</p>
+<h3 id="interference">Microsoft Interference</h3>
+
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
+for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
+interference.</p>
- <p>A person or company</em></ins></span> has <span
class="inserted"><ins><em>the right to cease to work on a particular
- program; the wrong here is Microsoft does this after
having</em></ins></span> made <span class="removed"><del><strong>companies'
Windows machines managed by</strong></del></span> the
-<span class="removed"><del><strong>company's
-sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue</strong></del></span>
- users <span class="inserted"><ins><em>dependent on Microsoft, because they
are not free</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>ask anyone
- else</em></ins></span> to <span class="inserted"><ins><em>work
on</em></ins></span> the <span class="removed"><del><strong>sysadmins about not
“upgrading” to</strong></del></span> <span
class="inserted"><ins><em>program for them.</p>
+<ul>
+ <li><p>Windows displays
+ <a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ intrusive ads for Microsoft products and its
+ partners' products</a>.</p>
+ <p>The article's author starts from</strong></del></span> <span
class="inserted"><ins><em>them.</p>
</li>
<li id="M201306220">
<p><a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
- informs the NSA of bugs in</em></ins></span> Windows
-<span
class="removed"><del><strong>10</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>before fixing them</a>.</p>
+ informs</em></ins></span> the <span class="removed"><del><strong>premise
that Microsoft
+ has a right to control what Windows does to users, as long as it
+ doesn't go “too far”. We disagree.</p></li>
+
+ <li><p>Microsoft inserts <a
+href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
+ annoying advertisements inside</strong></del></span> <span
class="inserted"><ins><em>NSA</em></ins></span> of <span
class="removed"><del><strong>the File Explorer</a> to nag
+ users to buy subscriptions for the OneDrive service.</p></li>
+
+<li>In order to increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice and privacy</a>.
+</li>
+
+<li><p>Microsoft has
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
+users obnoxiously and repeatedly to install Windows
10</a>.</p></li>
+
+ <li><p>Microsoft
+ <a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
+ tricking
+ users</a> <a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+into replacing Windows 7 with Windows 10</a>.</p></li>
+
+ <li><p>Microsoft has made companies'</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> Windows <span
class="removed"><del><strong>machines managed by the
+company's
+sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue</strong></del></span>
<span class="inserted"><ins><em>before fixing them</a>.</p>
</li>
</ul>
@@ -516,11 +510,11 @@
<h3 id="subscriptions">Microsoft Subscriptions</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-subscript -->
<li id="M201507150">
- <p>Microsoft Office forces users <a
+ <p>Microsoft Office forces</em></ins></span> users <span
class="inserted"><ins><em><a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
- subscribe to Office 365 to be able to create/edit
documents</a>.</p>
+ subscribe</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>Office 365</em></ins></span> to <span
class="removed"><del><strong>the sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to <span
class="removed"><del><strong>Windows
+10</a>.</p></li></strong></del></span> <span
class="inserted"><ins><em>create/edit documents</a>.</p>
</li></em></ins></span>
</ul>
@@ -532,7 +526,6 @@
<li><p>Windows</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-surv -->
<li id="M201710134">
<p>Windows</em></ins></span> 10 telemetry program sends information
to Microsoft about
the user's computer and their use of the computer.</p>
@@ -609,66 +602,67 @@
<p>To use proprietary software is to invite such <span
class="removed"><del><strong>treatment.</p></li>
<li><p>
- <a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"></strong></del></span>
<span class="inserted"><ins><em>treatment.</p>
- </li>
-
- <li id="M201508130">
- <p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
- Windows 10 <span class="removed"><del><strong>comes with 13 screens of
snooping options</a>, all enabled by default,
- and turning them off would be daunting</strong></del></span> <span
class="inserted"><ins><em>sends identifiable information</em></ins></span> to
<span class="removed"><del><strong>most users.</p></li>
+ <a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
+ Windows 10 comes with 13 screens of snooping options</a>, all enabled
by default,
+ and turning them off would be daunting to most users.</p></li>
<li><p>
- Windows</strong></del></span> <span
class="inserted"><ins><em>Microsoft</a>, even if
- a user turns off its Bing search and Cortana features, and activates
- the privacy-protection settings.</p>
- </li>
-
- <li id="M201507300">
- <p>Windows</em></ins></span> 10 <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></em></ins></span>
- ships with default settings that show no regard for the privacy of
- its users</a>, giving Microsoft the “right” to snoop on
- the users' files, text input, voice input, location info, contacts,
- calendar records and web browsing history, as well as automatically
- connecting the machines to open
- <span class="removed"><del><strong>hotspots and showing targeted
ads.</p>
+ Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ ships with default settings that show no regard for the
+ privacy of its users</a>, giving Microsoft the “right”
+ to snoop on the users' files, text input, voice input,
+ location info, contacts, calendar records and web browsing
+ history, as well as automatically connecting the machines to open
+ hotspots and showing targeted ads.</p>
<p>We can suppose Microsoft look at users' files for the US government
on
demand, though the “privacy policy” does not explicit say so.
Will it
look at users' files for the Chinese government on
demand?</p></li>
<li><p>
- <a
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
- Windows 10 sends identifiable information to Microsoft</a>, even if a
user
- turns off its Bing search and Cortana features, and activates the
- privacy-protection settings.</p></li>
+ <a</strong></del></span> <span
class="inserted"><ins><em>treatment.</p>
+ </li>
- <li><p>The unique “advertising ID” for each user
enables other companies to
- track the browsing of each specific user.</p></li>
+ <li id="M201508130">
+ <p><a</em></ins></span>
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+ Windows 10 sends identifiable information to Microsoft</a>, even if
+ a user turns off its Bing search and Cortana features, and activates
+ the privacy-protection <span
class="removed"><del><strong>settings.</p></li>
- <li>Spyware in Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
- Windows Update snoops on</strong></del></span> <span
class="inserted"><ins><em>hotspots and showing targeted ads.</p>
+ <li><p>The unique “advertising
ID”</strong></del></span> <span
class="inserted"><ins><em>settings.</p>
+ </li>
- <p>We can suppose Microsoft look at users' files
for</em></ins></span> the <span class="removed"><del><strong>user.</a>
+ <li id="M201507300">
+ <p>Windows 10 <a
+
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ ships with default settings that show no regard</em></ins></span> for
<span class="removed"><del><strong>each user enables other companies to
+ track</strong></del></span> the <span
class="removed"><del><strong>browsing</strong></del></span> <span
class="inserted"><ins><em>privacy</em></ins></span> of <span
class="removed"><del><strong>each specific user.</p></li>
+
+ <li>Spyware in Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ Windows Update snoops on the user.</a>
<a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
- Windows 8.1 snoops</strong></del></span> <span class="inserted"><ins><em>US
government</em></ins></span>
- on <span class="removed"><del><strong>local searches.</a> And
there's a
+ Windows 8.1 snoops on local searches.</a> And there's a
<a href="http://www.marketoracle.co.uk/Article40836.html">
secret NSA key in Windows</a>, whose functions we don't
know.</li>
<li><p>
- <a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows</strong></del></span> <span
class="inserted"><ins><em>demand, though</em></ins></span> the <span
class="removed"><del><strong>NSA to directly examine</strong></del></span>
<span class="inserted"><ins><em>“privacy policy” does not explicitly
- say so. Will it look at</em></ins></span> users' <span
class="removed"><del><strong>data.</a></p>
+ <a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"></strong></del></span>
+ <span class="inserted"><ins><em>its users</a>,
giving</em></ins></span> Microsoft <span class="removed"><del><strong>SkyDrive
allows</strong></del></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>“right”</em></ins></span> to <span
class="removed"><del><strong>directly examine</strong></del></span> <span
class="inserted"><ins><em>snoop on
+ the</em></ins></span> users' <span
class="removed"><del><strong>data.</a></p>
</li>
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.</strong></del></span>
<span class="inserted"><ins><em>files, text input, voice input, location info,
contacts,
+ calendar records and web browsing history, as well as automatically
+ connecting the machines to open hotspots and showing targeted
ads.</p>
+
+ <p>We can suppose</em></ins></span> Microsoft <span
class="removed"><del><strong>changed Skype
<a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span
class="inserted"><ins><em>files</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the Chinese government
+ specifically</strong></del></span> <span class="inserted"><ins><em>look
at users' files</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the US government
+ on demand, though the “privacy policy” does not explicitly
+ say so. Will it look at users' files for the Chinese government
on demand?</p></em></ins></span>
</li>
@@ -747,7 +741,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-jail -->
<li id="M201706130"></em></ins></span>
<p>Windows 10 S <span class="removed"><del><strong>ought to be
called Windows 10 J, for “Jail”:</strong></del></span> <span
class="inserted"><ins><em>was a jail:</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">only</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -782,7 +775,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-tyrant -->
<li id="M201607150"></em></ins></span>
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -865,7 +857,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 07:58:35 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-microsoft.ja-diff.html 10 Oct 2018 07:58:35 -0000 1.25
+++ po/malware-microsoft.ja-diff.html 17 Oct 2018 10:01:35 -0000 1.26
@@ -97,7 +97,6 @@
<li><p>Microsoft</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-back-door -->
<li id="M201608172">
<p id="windows-update">Microsoft</em></ins></span>
Windows has a universal back door through which <a <span
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"></strong></del></span>
@@ -172,7 +171,6 @@
<h3 id="drm">Microsoft DRM</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-dr -->
<li id="M200708131">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM</em></ins></span>
in <span class="removed"><del><strong>fact <a
@@ -196,7 +194,7 @@
<h3 id="insecurity">Microsoft Insecurity</h3>
<span class="removed"><del><strong><ul>
- <li><p>A <a</strong></del></span>
+ <li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer</strong></del></span>
<span class="inserted"><ins><em><p>These bugs are/were not intentional,
so unlike the rest of the file
they do not count as malware. We mention them to refute the
@@ -204,7 +202,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-insec -->
<li id="M201705120">
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
@@ -213,9 +210,9 @@
</li>
<li id="M201608020">
- <p>A <a</em></ins></span>
+ <p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
- in Internet Explorer and Edge</a> allows an attacker to retrieve
+ in Internet Explorer</em></ins></span> and Edge</a> allows an
attacker to retrieve
Microsoft account credentials, if the user is tricked into visiting
a malicious link.</p>
</li>
@@ -241,62 +238,69 @@
<p>Various proprietary programs often mess up</em></ins></span> the
<span class="removed"><del><strong>user.
But they</strong></del></span> <span class="inserted"><ins><em>user's system.
They</em></ins></span>
are <span class="removed"><del><strong>a lot</strong></del></span> like <span
class="removed"><del><strong>malware, since</strong></del></span> <span
class="inserted"><ins><em>sabotage, but</em></ins></span> they are <span
class="removed"><del><strong>technical Microsoft
-actions that harm</strong></del></span> <span class="inserted"><ins><em>not
grave enough</em></ins></span> to <span class="inserted"><ins><em>qualify
for</em></ins></span> the <span class="inserted"><ins><em>word
+actions that harm</strong></del></span> <span class="inserted"><ins><em>not
grave enough</em></ins></span> to <span class="inserted"><ins><em>qualify
for</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>word
“sabotage”. Nonetheless, they are nasty and wrong. This
-section describes examples of Microsoft committing interference.</p>
+section describes examples</em></ins></span> of <span
class="removed"><del><strong>specific Microsoft software.</p>
+
+<ul>
+ <li><p>Once</strong></del></span> Microsoft <span
class="removed"><del><strong>has tricked a user into accepting
installation</strong></del></span> <span class="inserted"><ins><em>committing
interference.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-interf -->
<li id="M201809120">
- <p>One version of Windows 10 <a
-
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
- harangues</em></ins></span> users <span class="inserted"><ins><em>if they
try to install Firefox (or Chrome)</a>.</p>
+ <p>One version</em></ins></span> of Windows
+ <span class="removed"><del><strong>10,</strong></del></span> <span
class="inserted"><ins><em>10</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+ find that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
+ harangues users if</em></ins></span> they <span
class="removed"><del><strong>are denied the option</strong></del></span> <span
class="inserted"><ins><em>try</em></ins></span> to <span
class="removed"><del><strong>cancel or even postpone the
+ imposed date of installation</a>.
+ </p>
+ <p>This demonstrates what we've said for years: using proprietary
+ software means letting someone have power over you, and you're
+ going</strong></del></span> <span class="inserted"><ins><em>install Firefox
(or Chrome)</a>.</p>
</li>
<li id="M201803190">
- <p>Microsoft is planning to make Windows <a
-
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
- impose use</em></ins></span> of <span
class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>its browser, Edge, in certain
circumstances</a>.</p>
+ <p>Microsoft is planning</em></ins></span> to <span
class="removed"><del><strong>get screwed sooner or later.</p></li>
- <p>The reason</em></ins></span> Microsoft <span
class="removed"><del><strong>software.</p>
+ <li><p>Microsoft
+ has</strong></del></span> <span class="inserted"><ins><em>make
Windows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
+ all future Intel CPUs for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
+ impose use of its browser, Edge, in certain
circumstances</a>.</p>
-<ul>
- <li><p>Once</strong></del></span> <span
class="inserted"><ins><em>can force things on users is that Windows
- is nonfree.</p>
+ <p>The reason Microsoft can force things on users is
that</em></ins></span> Windows <span
class="removed"><del><strong>7</strong></del></span>
+ <span class="inserted"><ins><em>is nonfree.</p>
</li>
<li id="M201703170">
<p>Windows displays <a
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
- intrusive ads for Microsoft products and its partners'
+ intrusive ads for Microsoft products</em></ins></span> and <span
class="removed"><del><strong>8</a>. Those machines will
+ be stuck with</strong></del></span> <span class="inserted"><ins><em>its
partners'
products</a>.</p>
- <p>The article's author starts from the premise
that</em></ins></span> Microsoft has <span
class="removed"><del><strong>tricked</strong></del></span>
- a <span class="removed"><del><strong>user into accepting
installation</strong></del></span> <span class="inserted"><ins><em>right to
control what Windows does to users, as long as it doesn't
+ <p>The article's author starts from</em></ins></span> the <span
class="removed"><del><strong>nastier</strong></del></span> <span
class="inserted"><ins><em>premise that Microsoft has
+ a right to control what</em></ins></span> Windows <span
class="removed"><del><strong>10.</strong></del></span> <span
class="inserted"><ins><em>does to users, as long as it doesn't
go “too far”. We disagree.</p>
</li>
<li id="M201608170">
- <p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download</em></ins></span> of Windows
- <span class="removed"><del><strong>10,</strong></del></span> <span
class="inserted"><ins><em>10</a>
- on computers that were running Windows 7 and 8,
Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- repeatedly switched on a flag</em></ins></span> that <span
class="inserted"><ins><em>urged users to
- “upgrade” to Windows 10</a> when</em></ins></span> they
<span class="removed"><del><strong>are denied</strong></del></span> <span
class="inserted"><ins><em>had turned
- it off, in</em></ins></span> the <span
class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>hope that some day they would fail</em></ins></span>
to <span class="removed"><del><strong>cancel or even postpone the
- imposed date</strong></del></span> <span class="inserted"><ins><em>say no.
+ <p> After</em></ins></span> <a <span
class="removed"><del><strong>href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
+ AMD and Qualcomm CPUs, too</a>.
+ </p>
+ <p>Of course,</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html#windows10-forcing">forcing
the download of Windows 10</a>
+ on computers that were running</em></ins></span> Windows 7 and <span
class="removed"><del><strong>8</strong></del></span> <span
class="inserted"><ins><em>8, Microsoft <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ repeatedly switched on a flag that urged users to
+ “upgrade” to Windows 10</a> when they had turned
+ it off, in the hope that some day they would fail to say no.
To do this, Microsoft used <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
<p>A detailed <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
- analysis</em></ins></span> of <span
class="removed"><del><strong>installation</a>.
- </p>
- <p>This demonstrates what we've said for years: using proprietary
- software means letting someone have power over you, and you're
- going</strong></del></span> <span class="inserted"><ins><em>Microsoft's
scheme</a> is available on the Electronic
+ analysis of Microsoft's scheme</a> is available on the Electronic
Frontier Foundation's website.</p>
</li>
@@ -304,31 +308,33 @@
<p>Microsoft has made companies'
Windows machines managed by the company's sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
- users</em></ins></span> to <span class="removed"><del><strong>get screwed
sooner or later.</p></li>
-
- <li><p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>complain to the sysadmins about not
“upgrading”
+ users to complain to the sysadmins about not “upgrading”
to Windows 10</a>.</p>
</li>
<li id="M201601160">
- <p>Microsoft</em></ins></span> has <a
+ <p>Microsoft has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
all future Intel CPUs for Windows 7 and 8</a>. Those
machines will be stuck with the nastier Windows 10. <a
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825">
- AMD and Qualcomm CPUs, <span class="removed"><del><strong>too</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
+ AMD and Qualcomm CPUs, too</a>.</p>
- <p>Of course, Windows 7 and 8 are unethical too, because they are
+ <p>Of course, Windows 7 and 8</em></ins></span> are unethical too,
because they are
proprietary software. But this example of Microsoft's wielding its
power demonstrates the power it <span class="removed"><del><strong>holds.
</p></strong></del></span> <span
class="inserted"><ins><em>holds.</p></em></ins></span>
<p>Free software developers also stop maintaining old versions of
- their programs, but this is not unfair to <span
class="removed"><del><strong>users because</strong></del></span> <span
class="inserted"><ins><em>users because the users of
+ their programs, but this is not unfair to users because the users of
free software have control over it. If it is important enough to you,
you and other users can hire someone to support the old version on
- your future platforms.</p>
+ your future <span class="removed"><del><strong>platforms.
+ </p></li>
+
+ <li><p>Microsoft
+ is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
+ forcibly pushing</strong></del></span> <span
class="inserted"><ins><em>platforms.</p>
</li>
</ul>
@@ -341,10 +347,10 @@
actions that harm the users of specific Microsoft software.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-sab -->
<li id="M201704194">
- <p>Microsoft has made Windows 7
- and 8 cease to function on certain new computers, <a
+ <p>Microsoft has made</em></ins></span> Windows
+ <span class="removed"><del><strong>update</strong></del></span> <span
class="inserted"><ins><em>7
+ and 8 cease</em></ins></span> to <span class="removed"><del><strong>its
version 10</a>, ignoring the flag</strong></del></span> <span
class="inserted"><ins><em>function</em></ins></span> on <span
class="inserted"><ins><em>certain new computers, <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
forcing their owners to switch to Windows 10</a>.</p>
</li>
@@ -352,22 +358,38 @@
<li id="M201704134">
<p>Microsoft <a
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support for Windows 7 and 8 on recent processors</a>
+ has dropped support for</em></ins></span> Windows 7 <span
class="removed"><del><strong>or</strong></del></span> <span
class="inserted"><ins><em>and</em></ins></span> 8
+ <span class="removed"><del><strong>that you could set
to</strong></del></span> <span class="inserted"><ins><em>on recent
processors</a>
in a big hurry.</p>
<p>It makes no difference what legitimate reasons Microsoft might
- have for not doing work to support them. If it doesn't want to do
- this work, it should let users do the work.</p>
+ have for</em></ins></span> not <span class="removed"><del><strong>upgrade.
This reaffirms</strong></del></span> <span class="inserted"><ins><em>doing
work to support them. If it doesn't want to do
+ this work, it should let users do</em></ins></span> the <span
class="removed"><del><strong>presence</strong></del></span> <span
class="inserted"><ins><em>work.</p>
</li>
<li id="M201606270">
- <p id="windows10-forcing">In its efforts to trick users of Windows
- 7 and 8 into installing all-spying Windows 10 against their
- will, Microsoft forced their computers to <a
+ <p id="windows10-forcing">In its efforts to trick
users</em></ins></span> of
+ <span class="removed"><del><strong>a <a
href="/proprietary/proprietary-back-doors.html">universal
+ back door in Windows</a></strong></del></span> <span
class="inserted"><ins><em>Windows</em></ins></span>
+ 7 and <span class="removed"><del><strong>8.</p></li>
+
+ <li><p>Windows</strong></del></span> <span
class="inserted"><ins><em>8 into installing all-spying
Windows</em></ins></span> 10 <span
class="removed"><del><strong>“upgrades” <a
+
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
+ delete applications</a> without asking
permission.</p></li>
+
+ <li><p></strong></del></span> <span
class="inserted"><ins><em>against their
+ will,</em></ins></span> Microsoft <span class="removed"><del><strong>is
<a
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
+ repeatedly nagging many users</strong></del></span> <span
class="inserted"><ins><em>forced their computers</em></ins></span> to <span
class="removed"><del><strong>install</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
- silently download… the whole of Windows 10</a>! Apparently,
- this was done through a <a
- href="/proprietary/proprietary-back-doors.html#windows-update">
+ silently download… the whole of</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.
+ </p></li>
+
+<li><p>
+Microsoft</strong></del></span> <span class="inserted"><ins><em>10</a>!
Apparently,
+ this</em></ins></span> was <span class="removed"><del><strong>for
months</strong></del></span> <span class="inserted"><ins><em>done through
a</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
+tricking users</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#windows-update">
universal back door</a>. Not only did the unwanted downloads <a
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/">
jeopardize important operations in regions of the world with poor
@@ -378,64 +400,39 @@
</li>
<li id="M201606010">
- <p>Once Microsoft has tricked a user
- into accepting installation of Windows 10, <a
+ <p>Once Microsoft has tricked a user</em></ins></span>
+ into <span class="removed"><del><strong>“upgrading”
to</strong></del></span> <span class="inserted"><ins><em>accepting installation
of</em></ins></span> Windows <span class="removed"><del><strong>10</a>,
if</strong></del></span> <span class="inserted"><ins><em>10, <a
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that they are denied the option to cancel or even
postpone</em></ins></span> the
- <span class="removed"><del><strong>users</strong></del></span>
- <span class="inserted"><ins><em>imposed date</em></ins></span> of <span
class="removed"><del><strong>free</strong></del></span> <span
class="inserted"><ins><em>installation</a>.</p>
-
- <p>This demonstrates what we've said for years: using
proprietary</em></ins></span>
- software <span class="inserted"><ins><em>means letting
someone</em></ins></span> have <span
class="removed"><del><strong>control</strong></del></span> <span
class="inserted"><ins><em>power</em></ins></span> over <span
class="removed"><del><strong>it. If it is important
- enough to</strong></del></span> you, <span
class="removed"><del><strong>you</strong></del></span> and <span
class="removed"><del><strong>other users can hire someone to support
- the old version on your future platforms.
- </p></li>
+ find that</em></ins></span> they
+<span class="removed"><del><strong>failed</strong></del></span> <span
class="inserted"><ins><em>are denied the option</em></ins></span> to <span
class="removed"><del><strong>notice and say no.
+</p></li>
- <li><p>Microsoft
- is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
- forcibly pushing Windows
- update</strong></del></span> <span class="inserted"><ins><em>you're
going</em></ins></span>
- to <span class="removed"><del><strong>its version 10</a>, ignoring
the flag on Windows 7</strong></del></span> <span class="inserted"><ins><em>get
screwed sooner</em></ins></span> or <span class="removed"><del><strong>8
- that you could set</strong></del></span> <span
class="inserted"><ins><em>later.</p>
+ <li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ Microsoft informs</strong></del></span> <span
class="inserted"><ins><em>cancel or even postpone</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span>
+ <span class="inserted"><ins><em>imposed date</em></ins></span> of <span
class="removed"><del><strong>bugs in Windows before fixing
them.</a></p></li>
+
+ <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"></strong></del></span>
<span class="inserted"><ins><em>installation</a>.</p>
+
+ <p>This demonstrates what we've said for years: using proprietary
+ software means letting someone have power over you, and you're going
+ to get screwed sooner or later.</p>
</li>
<li id="M201601310">
<p>FTDI's proprietary driver
- for its USB-to-serial chips has been designed</em></ins></span> to <span
class="removed"><del><strong>not upgrade. This reaffirms the presence of
- a</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">universal
- back door in Windows</a> 7 and 8.</p></li>
-
- <li><p>Windows</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
+ for its USB-to-serial chips has been designed to <a
+
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
- so that they no longer work. Microsoft is <a
+ so that they no longer work.</em></ins></span> Microsoft <span
class="inserted"><ins><em>is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
this automatically</a> as an “upgrade”.</p>
</li>
<li id="M201511240">
- <p>Windows</em></ins></span> 10 “upgrades” <a
+ <p>Windows 10 “upgrades” <a
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
- delete applications</a> without asking <span
class="removed"><del><strong>permission.</p></li>
-
- <li><p>
- Microsoft is <a
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
- repeatedly nagging many users to install Windows 10</a>.
- </p></li>
-
-<li><p>
-Microsoft was for months <a
-href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
-tricking users into “upgrading” to Windows 10</a>, if they
-failed to notice and say no.
-</p></li>
-
- <li><p><a
-href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
- Microsoft informs the NSA of bugs in Windows before fixing
them.</a></p></li>
-
- <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">
- Microsoft</strong></del></span> <span
class="inserted"><ins><em>permission.</p>
+ delete applications</a> without asking permission.</p>
</li>
<li id="M201503260">
@@ -465,20 +462,13 @@
<h3 <span class="removed"><del><strong>id="interference">Microsoft
Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span> <span
class="inserted"><ins><em>id="subscriptions">Microsoft
Subscriptions</h3>
+<p>Various proprietary programs often mess up</strong></del></span>
<span class="inserted"><ins><em>id="subscriptions">Microsoft
Subscriptions</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-subscript -->
<li id="M201507150">
<p>Microsoft Office forces users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
- subscribe</em></ins></span> to <span class="removed"><del><strong>qualify
-for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
-interference.</p>
-
-<ul>
-
-<li>In order</strong></del></span> <span
class="inserted"><ins><em>Office 365 to be able to create/edit
documents</a>.</p>
+ subscribe to Office 365 to be able to create/edit
documents</a>.</p>
</li>
</ul>
@@ -486,55 +476,60 @@
<h3 id="surveillance">Microsoft Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-surv -->
<li id="M201710134">
- <p>Windows 10 telemetry program sends information</em></ins></span>
to <span class="removed"><del><strong>increase Windows 10's install
base,</strong></del></span> Microsoft
-<span class="removed"><del><strong><a
+ <p>Windows 10 telemetry program sends information to Microsoft
about</em></ins></span>
+ the user's <span class="removed"><del><strong>system. They are like
sabotage, but they are not grave enough to qualify</strong></del></span> <span
class="inserted"><ins><em>computer and their use of the computer.</p>
+
+ <p>Furthermore,</em></ins></span> for <span
class="inserted"><ins><em>users who installed</em></ins></span> the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples</strong></del></span>
+ <span class="inserted"><ins><em>fourth stable build</em></ins></span> of
<span class="removed"><del><strong>Microsoft committing
+interference.</p>
+
+<ul>
+
+<li>In order to increase</strong></del></span> Windows <span
class="removed"><del><strong>10's install base, Microsoft
+<a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice</strong></del></span> <span
class="inserted"><ins><em>about
- the user's computer</em></ins></span> and <span
class="removed"><del><strong>privacy</a>.
+blatantly disregards user choice and privacy</a>.
</li>
<li><p>Microsoft has
-started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging</strong></del></span>
<span class="inserted"><ins><em>their use of the computer.</p>
-
- <p>Furthermore, for</em></ins></span> users <span
class="removed"><del><strong>obnoxiously and repeatedly to install Windows
10</a>.</p></li>
+started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
+users obnoxiously and repeatedly to install</strong></del></span> <span
class="inserted"><ins><em>10, called the
+ “Creators Update,”</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.</p></li>
<li><p>Microsoft
<a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
tricking
- users</a> <a
-href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
-into replacing Windows 7 with</strong></del></span> <span
class="inserted"><ins><em>who installed the
- fourth stable build of</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.</p></li>
-
- <li><p>Microsoft has made companies'</strong></del></span> <span
class="inserted"><ins><em>10, called the
- “Creators Update,”</em></ins></span> Windows <span
class="removed"><del><strong>machines managed by</strong></del></span> <span
class="inserted"><ins><em>maximized</em></ins></span> the
+ users</a></strong></del></span> <span
class="inserted"><ins><em>maximized the surveillance</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+into replacing Windows 7 with Windows 10</a>.</p></li>
+
+ <li><p>Microsoft has made companies' Windows machines
managed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"></em></ins></span>
+ by <span class="inserted"><ins><em>force setting</em></ins></span> the
<span class="removed"><del><strong>company's
-sysadmins</strong></del></span> <span
class="inserted"><ins><em>surveillance</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
-users to complain to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
- by force setting</em></ins></span> the <span
class="removed"><del><strong>sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>telemetry mode</em></ins></span> to <span
class="inserted"><ins><em>“Full”</a>.</p>
+sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+users</strong></del></span> <span class="inserted"><ins><em>telemetry
mode</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>“Full”</a>.</p>
<p>The <a
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
- “Full” telemetry mode</a> allows
Microsoft</em></ins></span> Windows
-<span class="removed"><del><strong>10</a>.</p></li>
-</ul>
-
-<h3 id="surveillance">Microsoft Surveillance</h3>
-
-<ul>
-
-<li><p>By</strong></del></span>
- <span class="inserted"><ins><em>engineers to access, among other things,
registry keys <a
+ “Full” telemetry mode</a> allows Microsoft Windows
+ engineers</em></ins></span> to <span class="removed"><del><strong>the
sysadmins about not “upgrading”</strong></del></span> <span
class="inserted"><ins><em>access, among other things, registry keys <a
href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
can contain sensitive information like administrator's login
password</a>.</p>
</li>
<li id="M201702020">
- <p>DRM-restricted files can be used to <a
+ <p>DRM-restricted files can be used</em></ins></span> to <span
class="removed"><del><strong>Windows
+10</a>.</p></li>
+</ul>
+
+<h3 id="surveillance">Microsoft Surveillance</h3>
+
+<ul>
+
+<li><p>By</strong></del></span> <span
class="inserted"><ins><em><a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">
identify people browsing through Tor</a>. The vulnerability exists
only if you use Windows.</p>
@@ -583,33 +578,40 @@
<p>To use proprietary software is to invite such <span
class="removed"><del><strong>treatment.</p></li>
<li><p>
- <a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
- Windows 10 comes with 13 screens of snooping options</a>, all enabled
by default,
- and turning them off would be daunting to most users.</p></li>
+ <a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"></strong></del></span>
<span class="inserted"><ins><em>treatment.</p>
+ </li>
- <li><p>
- Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
- ships with default settings that show no regard for the
- privacy of its users</a>, giving Microsoft the “right”
- to snoop on the users' files, text input, voice input,
- location info, contacts, calendar records and web browsing
- history, as well as automatically connecting the machines to open
- hotspots and showing targeted ads.</p>
-
- <p>We can suppose Microsoft look at users' files for the US government
on
- demand, though the “privacy policy” does not explicit say so.
Will it
- look at users' files for the Chinese government on
demand?</p></li>
+ <li id="M201508130">
+ <p><a
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
+ Windows 10 <span class="removed"><del><strong>comes with 13 screens of
snooping options</a>, all enabled by default,
+ and turning them off would be daunting</strong></del></span> <span
class="inserted"><ins><em>sends identifiable information</em></ins></span> to
<span class="removed"><del><strong>most users.</p></li>
<li><p>
- <a</strong></del></span> <span
class="inserted"><ins><em>treatment.</p>
+ Windows</strong></del></span> <span
class="inserted"><ins><em>Microsoft</a>, even if
+ a user turns off its Bing search and Cortana features, and activates
+ the privacy-protection settings.</p>
</li>
- <li id="M201508130">
- <p><a</em></ins></span>
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
- Windows 10 sends identifiable information to Microsoft</a>, even if
- a user turns off its Bing search and Cortana features, and activates
- the privacy-protection <span
class="removed"><del><strong>settings.</p></li>
+ <li id="M201507300">
+ <p>Windows</em></ins></span> 10 <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></em></ins></span>
+ ships with default settings that show no regard for the privacy of
+ its users</a>, giving Microsoft the “right” to snoop on
+ the users' files, text input, voice input, location info, contacts,
+ calendar records and web browsing history, as well as automatically
+ connecting the machines to open hotspots and showing targeted
ads.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US
government
+ on demand, though the “privacy policy” does not <span
class="removed"><del><strong>explicit</strong></del></span> <span
class="inserted"><ins><em>explicitly</em></ins></span>
+ say so. Will it look at users' files for the Chinese government
+ on <span class="removed"><del><strong>demand?</p></li>
+
+ <li><p>
+ <a
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+ Windows 10 sends identifiable information to Microsoft</a>, even if a
user
+ turns off its Bing search and Cortana features, and activates the
+ privacy-protection settings.</p></li>
<li><p>The unique “advertising ID” for each user
enables other companies to
track the browsing of each specific user.</p></li>
@@ -621,29 +623,17 @@
<a href="http://www.marketoracle.co.uk/Article40836.html">
secret NSA key in Windows</a>, whose functions we don't
know.</li>
- <li><p></strong></del></span> <span
class="inserted"><ins><em>settings.</p>
- </li>
-
- <li id="M201507300">
- <p>Windows 10</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
- ships with default settings that show no regard for the privacy of
- its users</a>, giving</em></ins></span> Microsoft <span
class="removed"><del><strong>SkyDrive allows</strong></del></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>“right”</em></ins></span> to <span
class="removed"><del><strong>directly examine</strong></del></span> <span
class="inserted"><ins><em>snoop on
- the</em></ins></span> users' <span
class="removed"><del><strong>data.</a></p>
+ <li><p>
+ <a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows the NSA to directly examine users'
data.</a></p>
</li>
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.</strong></del></span>
<span class="inserted"><ins><em>files, text input, voice input, location info,
contacts,
- calendar records and web browsing history, as well as automatically
- connecting the machines to open hotspots and showing targeted
ads.</p>
-
- <p>We can suppose</em></ins></span> Microsoft <span
class="removed"><del><strong>changed Skype
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
<a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span class="inserted"><ins><em>look
at users' files</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the US government
- on demand, though the “privacy policy” does not explicitly
- say so. Will it look at users' files for the Chinese government
- on demand?</p></em></ins></span>
+ specifically for spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>demand?</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>
@@ -721,7 +711,6 @@
<li><p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-jail -->
<li id="M201706130">
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -750,7 +739,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT microsoft-tyrant -->
<li id="M201607150"></em></ins></span>
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -834,7 +822,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 07:58:35 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/malware-microsoft.ru-en.html 11 Oct 2018 06:59:25 -0000 1.59
+++ po/malware-microsoft.ru-en.html 17 Oct 2018 10:01:35 -0000 1.60
@@ -67,7 +67,6 @@
<h3 id="back-doors">Microsoft Back Doors</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-back-door -->
<li id="M201608172">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
@@ -126,7 +125,6 @@
<h3 id="drm">Microsoft DRM</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-dr -->
<li id="M200708131">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
@@ -146,7 +144,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-insec -->
<li id="M201705120">
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
@@ -180,7 +177,6 @@
section describes examples of Microsoft committing interference.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-interf -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -261,7 +257,6 @@
actions that harm the users of specific Microsoft software.</p>
<ul class="blurbs">
-<!-- INSERT microsoft-sab -->
<li id="M201704194">
<p>Microsoft has made Windows 7
and 8 cease to function on certain new computers, <a
@@ -353,7 +348,6 @@
<h3 id="subscriptions">Microsoft Subscriptions</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-subscript -->
<li id="M201507150">
<p>Microsoft Office forces users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
@@ -365,7 +359,6 @@
<h3 id="surveillance">Microsoft Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-surv -->
<li id="M201710134">
<p>Windows 10 telemetry program sends information to Microsoft about
the user's computer and their use of the computer.</p>
@@ -513,7 +506,6 @@
<h3 id="jails">Microsoft Jails</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-jail -->
<li id="M201706130">
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -539,7 +531,6 @@
<h3 id="tyrants">Microsoft Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT microsoft-tyrant -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -617,7 +608,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/11 06:59:25 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-mobiles.de-diff.html 9 Oct 2018 13:30:41 -0000 1.11
+++ po/malware-mobiles.de-diff.html 17 Oct 2018 10:01:35 -0000 1.12
@@ -69,42 +69,52 @@
to present the specifics.</p></em></ins></span>
</div>
-<span class="removed"><del><strong><ul></strong></del></span>
+<span class="removed"><del><strong><ul>
+ <li><p>The</strong></del></span>
<span class="inserted"><ins><em></div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
-<ul class="blurbs"></em></ins></span>
- <li><p>The phone network
- <a href="https://ssd.eff.org/en/module/problem-mobile-phones">
+<ul class="blurbs">
+ <li id="M201502100">
+ <p>The</em></ins></span> phone network <a
+ href="https://ssd.eff.org/en/module/problem-mobile-phones">
tracks the movements of each phone</a>.</p>
+
<p>This is inherent in the design of the phone network: as long as
the phone is in communication with the network, there is no way
to stop the network from recording its location. Many countries
(including the US and the EU) require the network to store all
these location data for months or years.</p>
</li>
- <li><p id="universal-back-door">Almost every phone's
communication processor has
- a universal back door which
- is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used to make a phone transmit all conversations it
- hears</a>.</p>
- <p>The back
- door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ <span class="removed"><del><strong><li><p
id="universal-back-door">Almost</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311121">
+ <p id="universal-back-door">
+ Almost</em></ins></span> every phone's communication processor has
+ a universal back door which is <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it
hears</a>.</p>
+
+ <p>The back door <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
may take the form of bugs that have gone 20 years unfixed</a>.
The choice to leave the security holes in place is morally
equivalent to writing a back door.</p>
+
<p>The back door is in the “modem processor”, whose
job is to communicate with the radio network. In most phones,
the modem processor controls the microphone. In most phones it
has the power to rewrite the software for the main processor
too.</p>
+
<p>A few phone models are specially designed so that the modem
processor does not control the microphone, and so that it can't
change the software in the main processor. They still have the
back door, but at least it is unable to turn the phone unto a
listening device.</p>
- <p>The universal back door is apparently also used to make phones
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+
+ <p>The universal back door is apparently also used to make phones
<a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their
movements
are tracked, and may also make the listening feature work.</p>
</li>
@@ -151,7 +161,6 @@
<span class="inserted"><ins><em></ul>
<ul class="blurbs">
-<!-- INSERT mobiles-back-door -->
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
@@ -209,7 +218,6 @@
<h3 id="drm">Mobile DRM</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-dr -->
<li id="M201501030">
<p id="netflix-app-geolocation-drm">The Netflix Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
forcibly and remotely install apps</a> through</strong></del></span>
@@ -244,7 +252,6 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT mobiles-insec -->
<li id="M201807100"></em></ins></span>
<p>Siri, Alexa, and all the other voice-control systems can be <a
<span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
@@ -321,49 +328,40 @@
<ul>
<li><p>The Sarahah app
<a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note</strong></del></span>
+ uploads all phone numbers and email
addresses</a></strong></del></span>
<span class="inserted"><ins><em><li id="M201607290">
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
- WhatsApp messages are not entirely deleted</a>. They can be recovered
- in various ways.</p>
+ WhatsApp messages are not entirely deleted</a>. They can be
recovered</em></ins></span>
+ in <span class="removed"><del><strong>user's</strong></del></span> <span
class="inserted"><ins><em>various ways.</p>
</li>
<li id="M201607280">
<p>A half-blind security critique of a tracking app: it found that
<a
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
blatant flaws allowed anyone to snoop on a user's personal data</a>.
- The critique fails entirely to express concern</em></ins></span> that
<span class="removed"><del><strong>this article misuses</strong></del></span>
the <span class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>app
sends the
- personal data</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>a
server, where the <em>developer</em> gets it all.
+ The critique fails entirely to express concern that the app sends the
+ personal data to a server, where the <em>developer</em> gets
it all.
This “service” is for suckers!</p>
<p>The server surely has a “privacy policy,” and surely
- it is worthless since nearly all of them are.</p></em></ins></span>
+ it is worthless since nearly all of them are.</p>
</li>
- <span class="removed"><del><strong><li><p>Some
portable</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607190">
+ <li id="M201607190">
<p>A bug in a proprietary ASN.1 library, used
- in cell phone towers as well as cell</em></ins></span> phones <span
class="inserted"><ins><em>and routers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
- taking control</em></ins></span> of <span class="inserted"><ins><em>those
systems</a>.</p>
+ in cell phone towers as well as cell phones and routers, <a
+
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+ taking control of those systems</a>.</p>
</li>
<li id="M201603100">
<p>Many proprietary payment apps <a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
- personal</em></ins></span> data <span class="removed"><del><strong>to
China</a>.</p></li>
-
-<li>
- <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>in an insecure way</a>.
However,</em></ins></span>
- the <span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>worse aspect of these apps is that</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">payment
is not
+ personal data in an insecure way</a>. However,
+ the worse aspect of these apps is that <a
+ href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.</p>
</li>
@@ -371,9 +369,9 @@
<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
- your personal data</em></ins></span> on <span
class="removed"><del><strong>what people</strong></del></span> <span
class="inserted"><ins><em>remote servers</a>. This leaves personal
+ your personal data on remote servers</a>. This leaves personal
information like email addresses, passwords, and health information
- vulnerable. Because many of these apps</em></ins></span> are <span
class="removed"><del><strong>listening to or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>proprietary</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>makes it
+ vulnerable. Because many of these apps are proprietary it makes it
hard to impossible to know which apps are at risk.</p>
</li>
@@ -384,11 +382,10 @@
deactivated by its developer</a> which had discovered a security
flaw.</p>
- <p>That developer seems to</em></ins></span> be <span
class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span
class="inserted"><ins><em>conscientious about protecting personal
+ <p>That developer seems to be conscientious about protecting personal
data from third parties in general, but it can't protect that data
- from the state. Quite the contrary: confiding your data</em></ins></span>
to <span class="removed"><del><strong>serve them</strong></del></span> <span
class="inserted"><ins><em>someone
- else's server, if not first encrypted by you</em></ins></span> with <span
class="removed"><del><strong>targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>free software,
+ from the state. Quite the contrary: confiding your data to someone
+ else's server, if not first encrypted by you with free software,
undermines your rights.</p>
</li>
@@ -415,7 +412,6 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-surv -->
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
@@ -487,8 +483,8 @@
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ uploads all phone numbers and email addresses</a> in
user's</em></ins></span> address
+ book to <span class="removed"><del><strong>developer's server.
Note</strong></del></span> <span class="inserted"><ins><em>developer's server.
Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -555,16 +551,24 @@
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that this was done without the users' consent.
+ <p>The suit accuses</em></ins></span> that this <span
class="removed"><del><strong>article misuses</strong></del></span> <span
class="inserted"><ins><em>was done without</em></ins></span> the <span
class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>users'
consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>design
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
- <li id="M201704074">
- <p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
+ <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074">
+ <p>Pairs</em></ins></span> of <span
class="inserted"><ins><em>Android apps can collude
+ to transmit users' personal</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
+
+<li>
+ <p>Facebook's</strong></del></span> <span
class="inserted"><ins><em>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -572,14 +576,15 @@
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
+ announced an opt-in proprietary search</em></ins></span> app <span
class="removed"><del><strong>listens all</strong></del></span> <span
class="inserted"><ins><em>that it will</a> pre-install
+ on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>same information
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
+ <p>Currently, the app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
@@ -588,23 +593,24 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user data</em></ins></span> to <span class="removed"><del><strong>serve
them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>a Chinese
company</a>.</p></em></ins></span>
</li>
- <li id="M201611280">
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p></em></ins></span>
+ massive surveillance.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
+ <li id="M201611160"></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -637,7 +643,8 @@
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
<span class="removed"><del><strong>may turn them over to the UK government if
+ <dd>Sends traffic to LinkedIn. Also, it stores <span
class="removed"><del><strong>detailed logs
+ and may turn them over to the UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -690,8 +697,8 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span class="inserted"><ins><em>may turn them over to</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>detailed logs and
+ may turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
@@ -735,7 +742,8 @@
scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
and <span class="removed"><del><strong>location
tracking,</strong></del></span> <span
class="inserted"><ins><em>suggests</em></ins></span> you <span
class="removed"><del><strong>must
disable Google Play itself</strong></del></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey the user,
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>who is
+ in</em></ins></span> the <span class="removed"><del><strong>user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
@@ -743,24 +751,23 @@
<li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
+ pre-install on</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems to require online access
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The
app will give Verizon the same
+ information about</strong></del></span>
+ <span class="inserted"><ins><em>known-faces database, which
means</em></ins></span> the <span class="removed"><del><strong>users' searches
that Google normally gets when
they use its search engine.</p>
- <p>Currently, the app</strong></del></span> <span
class="inserted"><ins><em>who</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</strong></del></span>
- <span class="inserted"><ins><em>in</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>pictures are likely to be
- sent across</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers and face-recognition
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
+ sent across</em></ins></span> the <span class="removed"><del><strong>app
is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span>
and <span class="inserted"><ins><em>face-recognition
algorithms.</p>
- <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the
service.</p></em></ins></span>
+ <p>If so, none of Facebook users' pictures are private anymore,
+ even if</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However,</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them
to</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The Meitu
photo-editing</strong></del></span>
@@ -919,16 +926,16 @@
<span class="removed"><del><strong><li><p>Some Motorola phones
modify</strong></del></span>
<span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>apps (but not</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Motorola.</a></p>
+ <p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>to <a
+ href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola.</a></p>
</li>
- <li><p>Some manufacturers add a</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ <li><p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span> <span
class="inserted"><ins><em>apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs, on the average.</p></em></ins></span>
</li>
@@ -1036,7 +1043,6 @@
devices that come with</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT mobiles-jail -->
<li id="M201210080">
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></em></ins></span>
@@ -1055,7 +1061,6 @@
the restriction). Fortunately, most Android</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT mobiles-tyrant -->
<li id="M201110110">
<p><a
href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile</em></ins></span> devices <span class="inserted"><ins><em>that come
with Windows 8</em></ins></span> are <span class="removed"><del><strong>not
tyrants.</p></strong></del></span> <span
class="inserted"><ins><em>tyrants</a>.</p></em></ins></span>
@@ -1121,7 +1126,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- po/malware-mobiles.fr-en.html 9 Oct 2018 13:30:41 -0000 1.39
+++ po/malware-mobiles.fr-en.html 17 Oct 2018 10:01:35 -0000 1.40
@@ -57,40 +57,48 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
<ul class="blurbs">
- <li><p>The phone network
- <a href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ <li id="M201502100">
+ <p>The phone network <a
+ href="https://ssd.eff.org/en/module/problem-mobile-phones">
tracks the movements of each phone</a>.</p>
+
<p>This is inherent in the design of the phone network: as long as
the phone is in communication with the network, there is no way
to stop the network from recording its location. Many countries
(including the US and the EU) require the network to store all
these location data for months or years.</p>
</li>
- <li><p id="universal-back-door">Almost every phone's communication processor
has
- a universal back door which
- is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used to make a phone transmit all conversations it
- hears</a>.</p>
- <p>The back
- door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+
+ <li id="M201311121">
+ <p id="universal-back-door">
+ Almost every phone's communication processor has
+ a universal back door which is <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it hears</a>.</p>
+
+ <p>The back door <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
may take the form of bugs that have gone 20 years unfixed</a>.
The choice to leave the security holes in place is morally
equivalent to writing a back door.</p>
+
<p>The back door is in the “modem processor”, whose
job is to communicate with the radio network. In most phones,
the modem processor controls the microphone. In most phones it
has the power to rewrite the software for the main processor
too.</p>
+
<p>A few phone models are specially designed so that the modem
processor does not control the microphone, and so that it can't
change the software in the main processor. They still have the
back door, but at least it is unable to turn the phone unto a
listening device.</p>
- <p>The universal back door is apparently also used to make phones
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+
+ <p>The universal back door is apparently also used to make phones <a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their movements
are tracked, and may also make the listening feature work.</p>
</li>
@@ -127,7 +135,6 @@
</ul>
<ul class="blurbs">
-<!-- INSERT mobiles-back-door -->
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
@@ -170,7 +177,6 @@
<h3 id="drm">Mobile DRM</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-dr -->
<li id="M201501030">
<p id="netflix-app-geolocation-drm">The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
@@ -189,7 +195,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT mobiles-insec -->
<li id="M201807100">
<p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
@@ -322,7 +327,6 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-surv -->
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
@@ -765,7 +769,6 @@
<h3 id="jails">Mobile Jails</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-jail -->
<li id="M201210080">
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
@@ -778,7 +781,6 @@
<h3 id="tyrants">Mobile Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-tyrant -->
<li id="M201110110">
<p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile devices that come with Windows 8 are tyrants</a>.</p>
@@ -843,7 +845,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/malware-mobiles.it-diff.html 9 Oct 2018 13:30:41 -0000 1.16
+++ po/malware-mobiles.it-diff.html 17 Oct 2018 10:01:35 -0000 1.17
@@ -83,142 +83,145 @@
<ul>
<li>
<p>The universal back door</strong></del></span> <span
class="inserted"><ins><em>Apple or Google (including its subsidiaries).
-Malicious functionalities</em></ins></span> in <span
class="removed"><del><strong>portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is employed to listen through their microphones</a>.</p>
- <p>Most</strong></del></span> mobile <span
class="removed"><del><strong>phones have this universal back door, which has
been
- used to</strong></del></span> <span class="inserted"><ins><em>software
released by Apple or
-Google are listed in dedicated pages,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <p>More about</strong></del></span>
+Malicious functionalities</em></ins></span> in <span
class="removed"><del><strong>portable phones</strong></del></span> <span
class="inserted"><ins><em>mobile software released by Apple or
+Google are listed in dedicated pages,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ is employed</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple's
Operating Systems are
-Malware</a> and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google's
+Malware</a> and <a href="/proprietary/malware-google.html">Google's
Software Is Malware</a> respectively.</p>
<div class="important">
-<p>If you know</em></ins></span> of <span
class="removed"><del><strong>this problem</a>.</p>
+<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>listen through their
microphones</a>.</p>
+ <p>Most mobile phones have</strong></del></span> <span
class="inserted"><ins><em>be in</em></ins></span> this <span
class="removed"><del><strong>universal back door, which has been
+ used</strong></del></span> <span class="inserted"><ins><em>page but isn't
+here, please write</em></ins></span>
+to <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ turn them malicious</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL</em></ins></span> of <span
class="removed"><del><strong>this problem</a>.</p>
</li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come with a
- back door</a></strong></del></span> <span class="inserted"><ins><em>an
example</em></ins></span> that <span class="removed"><del><strong>provides
remote access</strong></del></span> <span
class="inserted"><ins><em>ought</em></ins></span> to <span
class="removed"><del><strong>the data stored on the
- device.</p>
+ Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> a
+ <span class="removed"><del><strong>back door</a> that provides remote
access</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
+to <span class="inserted"><ins><em>present</em></ins></span> the <span
class="removed"><del><strong>data stored on</strong></del></span> <span
class="inserted"><ins><em>specifics.</p>
+</div>
+</div>
+<div class="column-limit" id="phone-communications"></div>
+
+<ul class="blurbs">
+ <li id="M201502100">
+ <p>The phone network <a
+ href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ tracks</em></ins></span> the
+ <span class="removed"><del><strong>device.</p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span> <span
class="inserted"><ins><em>be in this page but isn't
-here, please write</em></ins></span>
-to <span class="removed"><del><strong>any file on the system.</p>
+ Samsung's back door</a> provides access to any file
on</strong></del></span> <span class="inserted"><ins><em>movements of each
phone</a>.</p>
+
+ <p>This is inherent in</em></ins></span> the <span
class="removed"><del><strong>system.</p>
</li>
<li>
- <p>In Android,</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>back door</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
-to <span class="removed"><del><strong>remotely delete apps</a>
(it</strong></del></span> <span class="inserted"><ins><em>present the
specifics.</p>
-</div>
-</div>
-<div class="column-limit"></div>
-
-<ul class="blurbs">
- <li><p>The phone network
- <a href="https://ssd.eff.org/en/module/problem-mobile-phones">
- tracks the movements of each phone</a>.</p>
- <p>This</em></ins></span> is <span
class="inserted"><ins><em>inherent</em></ins></span> in <span
class="removed"><del><strong>a program
+ <p>In Android, <a
+
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete apps</a>
(it</strong></del></span> <span class="inserted"><ins><em>design of the phone
network: as long as
+ the phone</em></ins></span> is in <span class="removed"><del><strong>a
program
called GTalkService).
</p>
<p>Google can also <a
href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
-title="at</strong></del></span> the <span class="removed"><del><strong>Wayback
Machine (archived May 20, 2015)">forcibly and remotely
+title="at</strong></del></span> <span class="inserted"><ins><em>communication
with</em></ins></span> the <span class="removed"><del><strong>Wayback Machine
(archived May 20, 2015)">forcibly and remotely
install apps</a> through GTalkService (which seems, since that article,
to have
-been merged into Google Play). This adds up to a universal back door.
</p>
+been merged into Google Play). This adds up</strong></del></span> <span
class="inserted"><ins><em>network, there is no way
+ to stop the network from recording its location. Many countries
+ (including the US and the EU) require the network</em></ins></span> to
<span class="inserted"><ins><em>store all
+ these location data for months or years.</p>
+ </li>
+
+ <li id="M201311121">
+ <p id="universal-back-door">
+ Almost every phone's communication processor has</em></ins></span>
+ a universal back <span class="removed"><del><strong>door. </p>
<p>
- Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span> of <span
class="removed"><del><strong>this power has not been
- malicious so far,</strong></del></span> the <span
class="removed"><del><strong>point</strong></del></span> <span
class="inserted"><ins><em>phone network: as long as
- the phone</em></ins></span> is <span class="removed"><del><strong>that
nobody should have such power,
- which could also be used maliciously. You might well decide to let a
- security service remotely <em>deactivate</em> programs that it
- considers malicious. But</strong></del></span> <span
class="inserted"><ins><em>in communication with the network,</em></ins></span>
there is no <span class="removed"><del><strong>excuse for allowing
it</strong></del></span> <span class="inserted"><ins><em>way</em></ins></span>
- to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
<span class="inserted"><ins><em>stop</em></ins></span> the <span
class="removed"><del><strong>programs, and you should
have</strong></del></span> <span class="inserted"><ins><em>network from
recording its location. Many countries
- (including</em></ins></span> the <span
class="removed"><del><strong>right to
- decide who (if anyone) to trust in this way.
+ Although Google's <em>exercise</em> of this power has not been
+ malicious so far, the point is that nobody should have such
power,</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span> which <span
class="removed"><del><strong>could also be</strong></del></span> <span
class="inserted"><ins><em>is <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often</em></ins></span> used <span
class="removed"><del><strong>maliciously. You might well
decide</strong></del></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> a
+ <span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs that it
+ considers malicious. But there is no excuse for
allowing</strong></del></span> <span class="inserted"><ins><em>phone transmit
all conversations</em></ins></span> it
+ <span class="removed"><del><strong>to
<em>delete</em></strong></del></span> <span
class="inserted"><ins><em>hears</a>.</p>
+
+ <p>The back door <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take</em></ins></span> the <span
class="removed"><del><strong>programs, and you should</strong></del></span>
<span class="inserted"><ins><em>form of bugs that</em></ins></span> have <span
class="removed"><del><strong>the right</strong></del></span> <span
class="inserted"><ins><em>gone 20 years unfixed</a>.
+ The choice</em></ins></span> to
+ <span class="removed"><del><strong>decide who (if
anyone)</strong></del></span> <span class="inserted"><ins><em>leave the
security holes in place is morally
+ equivalent</em></ins></span> to <span
class="removed"><del><strong>trust</strong></del></span> <span
class="inserted"><ins><em>writing a back door.</p>
+
+ <p>The back door is</em></ins></span> in <span
class="removed"><del><strong>this way.
</p>
</li>
</ul>
<h3 id="insecurity">Mobile Insecurity</h3>
-<p>These bugs are/were not intentional, so unlike</strong></del></span>
<span class="inserted"><ins><em>US and</em></ins></span> the <span
class="removed"><del><strong>rest of</strong></del></span> <span
class="inserted"><ins><em>EU) require</em></ins></span> the <span
class="removed"><del><strong>file
- they do not count as malware. We mention them</strong></del></span> <span
class="inserted"><ins><em>network</em></ins></span> to <span
class="removed"><del><strong>refute the
- supposition that prestigious proprietary software doesn't have grave
+<p>These bugs are/were not intentional, so unlike</strong></del></span>
the <span class="removed"><del><strong>rest of</strong></del></span> <span
class="inserted"><ins><em>“modem processor”, whose
+ job is to communicate with</em></ins></span> the <span
class="removed"><del><strong>file
+ they do not count as malware. We mention them</strong></del></span> <span
class="inserted"><ins><em>radio network. In most phones,
+ the modem processor controls the microphone. In most phones it
+ has the power</em></ins></span> to <span
class="removed"><del><strong>refute</strong></del></span> <span
class="inserted"><ins><em>rewrite</em></ins></span> the
+ <span class="removed"><del><strong>supposition that prestigious
proprietary</strong></del></span> software <span
class="removed"><del><strong>doesn't have grave
bugs.</p>
<ul>
<li>
- <p>Siri, Alexa, and</strong></del></span> <span
class="inserted"><ins><em>store</em></ins></span> all <span
class="removed"><del><strong>the other voice-control systems can be
- <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands in ultrasound that humans can't hear</a>.
- </p></strong></del></span>
- <span class="inserted"><ins><em>these location data for months or
years.</p></em></ins></span>
- </li>
+ <p>Siri, Alexa, and all</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> the <span
class="removed"><del><strong>other voice-control systems can be
+ <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs</strong></del></span> <span class="inserted"><ins><em>main
processor
+ too.</p>
-<span class="removed"><del><strong><li>
+ <p>A few phone models are specially designed so</em></ins></span>
that <span class="removed"><del><strong>play commands in
ultrasound</strong></del></span> <span class="inserted"><ins><em>the modem
+ processor does not control the microphone, and so</em></ins></span> that
<span class="removed"><del><strong>humans</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> can't <span
class="removed"><del><strong>hear</a>.
+ </p>
+</li>
+
+<li>
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be hijacked through their Wi-Fi chips</a> because
of</strong></del></span>
- <span class="inserted"><ins><em><li><p
id="universal-back-door">Almost every phone's communication processor
has</em></ins></span>
- a <span class="removed"><del><strong>bug in
+ can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
</li>
<li>
<p>Samsung
-phones</strong></del></span> <span class="inserted"><ins><em>universal back
door which
- is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
-a security hole that allows an SMS message</strong></del></span> <span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used</em></ins></span> to <span
class="removed"><del><strong>install
+phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
+a security hole that allows an SMS message to install
ransomware</a>.</p>
</li>
<li>
<p>Many proprietary payment apps <a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"></strong></del></span>
<span class="inserted"><ins><em>make a phone</em></ins></span> transmit <span
class="removed"><del><strong>personal data in an insecure way</a>.
-However, the worse aspect of these apps is that
-<a href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.
-</p>
-</li>
-
- <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones, Android, and
- BlackBerry</a>. While there is not much detail
here,</strong></del></span> <span class="inserted"><ins><em>all
conversations</em></ins></span> it <span class="removed"><del><strong>seems
that this
- does not operate via the universal</strong></del></span>
- <span class="inserted"><ins><em>hears</a>.</p>
- <p>The</em></ins></span> back
- door <span class="removed"><del><strong>that we know nearly all
- portable phones have. It may involve exploiting various bugs. There
are</strong></del></span> <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- <span class="removed"><del><strong>lots</strong></del></span>
- <span class="inserted"><ins><em>may take the form</em></ins></span> of
bugs <span class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>that have gone 20 years unfixed</a>.
- The choice to leave</em></ins></span> the <span
class="removed"><del><strong>phones' radio software</a>.</p>
- </li></strong></del></span> <span class="inserted"><ins><em>security
holes in place is morally
- equivalent to writing a back door.</p>
- <p>The back door is in the “modem processor”, whose
- job is to communicate with the radio network. In most phones,
- the modem processor controls the microphone. In most phones it
- has the power to rewrite the software for the main processor
- too.</p>
- <p>A few phone models are specially designed so that the modem
- processor does not control the microphone, and so that it can't
- change the software in the main processor. They still have the
- back door, but at least it is unable to turn the phone unto a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
+transmit personal data</strong></del></span>
+ <span class="inserted"><ins><em>change the software</em></ins></span> in
<span class="removed"><del><strong>an insecure way</a>.
+However,</strong></del></span> the <span class="removed"><del><strong>worse
aspect of these apps</strong></del></span> <span class="inserted"><ins><em>main
processor. They still have the
+ back door, but at least it</em></ins></span> is <span
class="removed"><del><strong>that
+<a
href="/philosophy/surveillance-vs-democracy.html">payment</strong></del></span>
<span class="inserted"><ins><em>unable to turn the phone unto a
listening device.</p>
- <p>The universal back door is apparently also used to make phones
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+
+ <p>The universal back door</em></ins></span> is <span
class="removed"><del><strong>not anonymous</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>apparently
also used to make phones <a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their
movements
- are tracked, and may also make the listening feature work.</p>
+ are tracked, and may also make the listening feature
work.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="summary" style="margin-top: 1em">
<h3>Type of malware</h3>
@@ -227,24 +230,25 @@
<!--<li><a
href="#censorship">Censorship</a></li>-->
<li><a href="#drm">Digital restrictions
management</a> or “DRM”—functionalities designed
- to restrict what users can do with the data in their computers.</li>
+ to restrict what users</em></ins></span> can <span
class="removed"><del><strong>tap</strong></del></span> <span
class="inserted"><ins><em>do with the</em></ins></span> data in <span
class="removed"><del><strong>smart phones, including iPhones, Android, and
+ BlackBerry</a>. While there is not much detail here, it
seems</strong></del></span> <span class="inserted"><ins><em>their
computers.</li>
<li><a href="#insecurity">Insecurity</a></li>
<!--<li><a
href="#interference">Interference</a></li>-->
<!--<li><a href="#sabotage">Sabotage</a></li>-->
<li><a href="#surveillance">Surveillance</a></li>
- <li><a href="#jails">Jails</a>—systems
- that impose censorship on application programs.</li>
+ <li><a
href="#jails">Jails</a>—systems</em></ins></span>
+ that <span class="removed"><del><strong>this
+ does</strong></del></span> <span class="inserted"><ins><em>impose censorship
on application programs.</li>
<li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system not “authorized” by the
- manufacturer.</li></em></ins></span>
+ that reject any operating system</em></ins></span> not <span
class="removed"><del><strong>operate via</strong></del></span> <span
class="inserted"><ins><em>“authorized” by the
+ manufacturer.</li>
</ul>
-<span class="inserted"><ins><em></div></em></ins></span>
+</div>
-<h3 <span class="removed"><del><strong>id="surveillance">Mobile
Surveillance</h3></strong></del></span> <span
class="inserted"><ins><em>id="back-doors">Mobile Back
Doors</h3></em></ins></span>
+<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
- <span class="inserted"><ins><em><li>
+ <li>
<p>See above for the <a href="#universal-back-door">general
universal back
door</a> in essentially all mobile phones, which permits converting
them into full-time listening devices.</p>
@@ -252,15 +256,14 @@
</ul>
<ul class="blurbs">
-<!-- INSERT mobiles-back-door -->
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door in the application processor, for Xiaomi's
+ a universal back door in</em></ins></span> the <span
class="inserted"><ins><em>application processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local phone
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the</em></ins></span>
+ universal back door <span class="inserted"><ins><em>in the modem
processor</em></ins></span> that <span class="removed"><del><strong>we know
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
company can use</a>.</p>
</li>
@@ -276,8 +279,10 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>. Nearly
- all models of mobile phones have a <a href="#universal-back-door">
+ A Chinese version of Android has a universal back door</a>.
Nearly</em></ins></span>
+ all
+ <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>have
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">
universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -295,7 +300,6 @@
<h3 id="drm">Mobile DRM</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-dr -->
<li id="M201501030">
<p id="netflix-app-geolocation-drm">The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
@@ -314,7 +318,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT mobiles-insec -->
<li id="M201807100">
<p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
@@ -447,7 +450,6 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-surv -->
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
@@ -575,16 +577,21 @@
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email
addresses</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data</em></ins></span> in <span
class="removed"><del><strong>user's address
- book</strong></del></span> <span class="inserted"><ins><em>the
device</a>.</p>
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data</em></ins></span> in the <span
class="removed"><del><strong>phones' radio
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+ <li><p>The Sarahah app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
the app would record the names of the audio files users
listen</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note</strong></del></span>
<span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
@@ -680,8 +687,8 @@
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it <span
class="removed"><del><strong>stores detailed logs
+ <span class="removed"><del><strong><dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
and may turn them over to the UK government if
requested.</dd>
@@ -735,7 +742,10 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>stores detailed logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+
+ <span class="inserted"><ins><em><dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
may turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -780,7 +790,8 @@
scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
and <span class="removed"><del><strong>location
tracking,</strong></del></span> <span
class="inserted"><ins><em>suggests</em></ins></span> you <span
class="removed"><del><strong>must
disable Google Play itself</strong></del></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey the user,
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>who is
+ in</em></ins></span> the <span class="removed"><del><strong>user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
@@ -788,24 +799,22 @@
<li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
+ pre-install on</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems to require online access
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The
app will give Verizon the same
+ information about</strong></del></span>
+ <span class="inserted"><ins><em>known-faces database, which
means</em></ins></span> the <span class="removed"><del><strong>users' searches
that Google normally gets when
they use its search engine.</p>
- <p>Currently, the app</strong></del></span> <span
class="inserted"><ins><em>who</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and</strong></del></span>
- <span class="inserted"><ins><em>in</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>pictures are likely to be
- sent across</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers and face-recognition
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
+ sent across</em></ins></span> the <span class="removed"><del><strong>app
is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span>
and <span class="inserted"><ins><em>face-recognition
algorithms.</p>
- <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the
service.</p></em></ins></span>
+ <p>If so, none of Facebook users' pictures are private anymore,
+ even if</em></ins></span> the user <span class="removed"><del><strong>must
explicitly opt-in before the app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>didn't “upload” them
to</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The Meitu
photo-editing</strong></del></span>
@@ -964,15 +973,15 @@
<span class="removed"><del><strong><li><p>Some Motorola phones
modify</strong></del></span>
<span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>apps (but not</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Motorola.</a></p>
+ <p>Gratis</em></ins></span> Android <span
class="removed"><del><strong>to <a
+ href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola.</a></p>
</li>
<li><p>Some manufacturers add a <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span> <span
class="inserted"><ins><em>100 <a
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span> <span
class="inserted"><ins><em>apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs, on the average.</p></em></ins></span>
</li>
@@ -1081,7 +1090,6 @@
devices that come with</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT mobiles-jail -->
<li id="M201210080">
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></em></ins></span>
@@ -1100,7 +1108,6 @@
the restriction). Fortunately, most Android</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT mobiles-tyrant -->
<li id="M201110110">
<p><a
href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile</em></ins></span> devices <span class="inserted"><ins><em>that come
with Windows 8</em></ins></span> are <span class="removed"><del><strong>not
tyrants.</p></strong></del></span> <span
class="inserted"><ins><em>tyrants</a>.</p></em></ins></span>
@@ -1166,7 +1173,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/malware-mobiles.ja-diff.html 9 Oct 2018 13:30:41 -0000 1.31
+++ po/malware-mobiles.ja-diff.html 17 Oct 2018 10:01:35 -0000 1.32
@@ -100,15 +100,18 @@
</div>
<span class="removed"><del><strong><h3 id="back-doors">Mobile Back
Doors</h3>
-<ul></strong></del></span>
-<span class="inserted"><ins><em><div class="column-limit"></div>
+<ul>
+ <li><p>The universal back door in portable
phones</strong></del></span>
+<span class="inserted"><ins><em><div class="column-limit"
id="phone-communications"></div>
-<ul class="blurbs"></em></ins></span>
- <li><p>The <span class="removed"><del><strong>universal back
door in portable phones</strong></del></span> <span
class="inserted"><ins><em>phone network</em></ins></span>
- <a
+<ul class="blurbs">
+ <li id="M201502100">
+ <p>The phone network</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
- employed</strong></del></span> <span
class="inserted"><ins><em>href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ employed</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://ssd.eff.org/en/module/problem-mobile-phones">
tracks the movements of each phone</a>.</p>
+
<p>This is inherent in the design of the phone network: as long as
the phone is in communication with the network, there is no
way</em></ins></span>
to <span class="removed"><del><strong>listen through their
microphones</a>.</p></strong></del></span> <span
class="inserted"><ins><em>stop the network from recording its location. Many
countries
@@ -117,19 +120,22 @@
</li>
<span class="removed"><del><strong><li><p>Most mobile phones
have</strong></del></span>
- <span class="inserted"><ins><em><li><p
id="universal-back-door">Almost every phone's communication processor
has</em></ins></span>
- a universal back <span
class="removed"><del><strong>door,</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span> which <span
class="removed"><del><strong>has been</strong></del></span>
- <span class="inserted"><ins><em>is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+
+ <span class="inserted"><ins><em><li id="M201311121">
+ <p id="universal-back-door">
+ Almost every phone's communication processor has</em></ins></span>
+ a universal back <span
class="removed"><del><strong>door,</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span> which <span
class="removed"><del><strong>has been</strong></del></span> <span
class="inserted"><ins><em>is <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
often</em></ins></span> used to <span class="removed"><del><strong><a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.</p>
</li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> a <span
class="inserted"><ins><em>phone transmit all conversations it
- hears</a>.</p>
- <p>The</em></ins></span> back <span
class="removed"><del><strong>door</a></strong></del></span>
- <span class="inserted"><ins><em>door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> a <span
class="inserted"><ins><em>phone transmit all conversations it
hears</a>.</p>
+
+ <p>The</em></ins></span> back <span
class="removed"><del><strong>door</a></strong></del></span> <span
class="inserted"><ins><em>door <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
may take the form of bugs</em></ins></span> that <span
class="removed"><del><strong>provides remote access</strong></del></span> <span
class="inserted"><ins><em>have gone 20 years unfixed</a>.
The choice</em></ins></span> to <span
class="inserted"><ins><em>leave</em></ins></span> the <span
class="removed"><del><strong>data stored on the
device.</p>
@@ -144,6 +150,7 @@
<p>In Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
Google has</strong></del></span> <span
class="inserted"><ins><em>writing</em></ins></span> a back <span
class="inserted"><ins><em>door.</p>
+
<p>The back</em></ins></span> door <span
class="removed"><del><strong>to remotely delete apps.</a>
(It</strong></del></span> is in <span class="removed"><del><strong>a program
called GTalkService).
</p>
@@ -155,6 +162,7 @@
the modem processor controls the microphone. In most phones it
has the power to rewrite the software for the main processor
too.</p>
+
<p>A few phone models are specially designed so that the modem
processor does not control the microphone,</em></ins></span> and <span
class="removed"><del><strong>remotely
install apps</a> through GTalkService (which seems,
since</strong></del></span> <span
class="inserted"><ins><em>so</em></ins></span> that <span
class="removed"><del><strong>article, to</strong></del></span> <span
class="inserted"><ins><em>it can't
@@ -162,6 +170,7 @@
<span class="removed"><del><strong>been merged into Google Play). This adds
up</strong></del></span> <span class="inserted"><ins><em>the
back door, but at least it is unable</em></ins></span> to <span
class="inserted"><ins><em>turn the phone unto</em></ins></span> a
<span class="inserted"><ins><em>listening device.</p>
+
<p>The</em></ins></span> universal back <span
class="removed"><del><strong>door. </p>
<p>
@@ -169,8 +178,8 @@
malicious so far, the point</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span> is <span
class="removed"><del><strong>that nobody should have such power,
which could</strong></del></span> <span
class="inserted"><ins><em>apparently</em></ins></span> also <span
class="removed"><del><strong>be</strong></del></span> used <span
class="removed"><del><strong>maliciously. You might well decide to let a
security service remotely <em>deactivate</em> programs that it
- considers malicious. But there is no excuse for allowing
it</strong></del></span> to <span
class="removed"><del><strong><em>delete</em> the
programs,</strong></del></span> <span class="inserted"><ins><em>make phones
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ considers malicious. But there is no excuse for allowing
it</strong></del></span> to <span
class="removed"><del><strong><em>delete</em> the
programs,</strong></del></span> <span class="inserted"><ins><em>make phones
<a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their
movements
are tracked,</em></ins></span> and <span
class="removed"><del><strong>you should have</strong></del></span> <span
class="inserted"><ins><em>may also make</em></ins></span> the <span
class="removed"><del><strong>right to
decide who (if anyone)</strong></del></span> <span
class="inserted"><ins><em>listening feature work.</p>
@@ -203,38 +212,30 @@
<ul>
<li>
-<span class="removed"><del><strong><p>Many proprietary payment apps <a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
-transmit personal data in an insecure way</a>.
-However,</strong></del></span>
- <span class="inserted"><ins><em><p>See above for</em></ins></span>
the <span class="removed"><del><strong>worse aspect of these apps is
that</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
-</p>
-</li>
-
- <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">general universal back
- door</a></em></ins></span> in <span
class="removed"><del><strong>smart</strong></del></span> <span
class="inserted"><ins><em>essentially all mobile</em></ins></span> phones,
<span class="removed"><del><strong>including iPhones, Android, and
- BlackBerry</a>. While there</strong></del></span> <span
class="inserted"><ins><em>which permits converting
+<span class="removed"><del><strong><p>Many proprietary payment
apps</strong></del></span>
+ <span class="inserted"><ins><em><p>See above for
the</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
+transmit personal data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">general universal back
+ door</a> in essentially all mobile phones, which permits converting
them into full-time listening devices.</p>
</li>
</ul>
<ul class="blurbs">
-<!-- INSERT mobiles-back-door -->
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door in the application processor, for Xiaomi's
+ a universal back door</em></ins></span> in <span
class="removed"><del><strong>an insecure way</a>.
+However,</strong></del></span> the <span class="removed"><del><strong>worse
aspect of these</strong></del></span> <span
class="inserted"><ins><em>application processor, for Xiaomi's
use</a>.</p>
- <p>This</em></ins></span> is <span class="removed"><del><strong>not
much detail here, it seems</strong></del></span> <span
class="inserted"><ins><em>separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor</em></ins></span> that <span
class="removed"><del><strong>this
- does not operate via</strong></del></span> the <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em>local phone
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor that the local phone
company can use</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has
a</em></ins></span> back door that <span class="removed"><del><strong>we know
nearly</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files” as well as forcibly install
apps</a>.</p>
@@ -245,11 +246,9 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>.
Nearly</em></ins></span>
- all
- <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>have
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">
- universal back door</em></ins></span> in the <span
class="removed"><del><strong>phones' radio
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad bother
+ A Chinese version of Android has a universal back door</a>. Nearly
+ all models of mobile phones have a <a href="#universal-back-door">
+ universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -258,26 +257,19 @@
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with
a back door</a> that provides remote access to the files stored on
- the device.</p></em></ins></span>
+ the device.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="surveillance">Mobile
Surveillance</h3>
-<ul>
-<li>
-<p>A half-blind security critique</strong></del></span> <span
class="inserted"><ins><em>id="drm">Mobile DRM</h3>
+<h3 id="drm">Mobile DRM</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-dr -->
<li id="M201501030">
<p id="netflix-app-geolocation-drm">The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
- forces the use</em></ins></span> of <span class="removed"><del><strong>a
tracking app: it found</strong></del></span> <span
class="inserted"><ins><em>Google DNS</a>. This is one of the
methods</em></ins></span> that <span class="removed"><del><strong><a
-href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
-blatant flaws allowed anyone</strong></del></span>
- <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span
class="removed"><del><strong>snoop on a user's personal data</a>.
-The critique fails entirely</strong></del></span> <span
class="inserted"><ins><em>enforce the geolocation restrictions dictated by the
+ forces the use of Google DNS</a>. This is one of the methods that
+ Netflix uses to enforce the geolocation restrictions dictated by the
movie studios.</p>
</li>
</ul>
@@ -286,14 +278,13 @@
<h3 id="insecurity">Mobile Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
- they do not count as malware. We mention them</em></ins></span> to <span
class="removed"><del><strong>express concern</strong></del></span> <span
class="inserted"><ins><em>refute the
- supposition</em></ins></span> that <span
class="inserted"><ins><em>prestigious proprietary software doesn't have grave
+ they do not count as malware. We mention them to refute the
+ supposition that prestigious proprietary software doesn't have grave
bugs.</p>
<ul class="blurbs">
-<!-- INSERT mobiles-insec -->
<li id="M201807100">
- <p>Siri, Alexa, and all</em></ins></span> the <span
class="removed"><del><strong>app sends</strong></del></span> <span
class="inserted"><ins><em>other voice-control systems can be <a
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -302,8 +293,7 @@
<li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos to people in</em></ins></span> the
-<span class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>owner's contact list</a>.</p>
+ photos to people in the owner's contact list</a>.</p>
</li>
<li id="M201704050">
@@ -318,9 +308,8 @@
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
- <p>This is in addition</em></ins></span> to <span
class="inserted"><ins><em>the fact that the car contains</em></ins></span> a
<span class="removed"><del><strong>server, where</strong></del></span> <span
class="inserted"><ins><em>cellular
- modem that tells big brother all</em></ins></span> the <span
class="removed"><del><strong><em>developer</em>
gets</strong></del></span> <span class="inserted"><ins><em>time
where</em></ins></span> it <span class="removed"><del><strong>all.
-This “service”</strong></del></span> <span
class="inserted"><ins><em>is. If you own
+ <p>This is in addition to the fact that the car contains a cellular
+ modem that tells big brother all the time where it is. If you own
such a car, it would be wise to disconnect the modem so as to turn
off the tracking.</p>
</li>
@@ -357,9 +346,9 @@
blatant flaws allowed anyone to snoop on a user's personal data</a>.
The critique fails entirely to express concern that the app sends the
personal data to a server, where the <em>developer</em> gets
it all.
- This “service”</em></ins></span> is for suckers!</p>
+ This “service” is for suckers!</p>
- <p>The server surely has a “privacy policy,” and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>surely
+ <p>The server surely has a “privacy policy,” and surely
it is worthless since nearly all of them are.</p>
</li>
@@ -426,7 +415,6 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-surv -->
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
@@ -637,7 +625,14 @@
<dt>DroidVPN and TigerVPN</dt>
<dd>Requests the <code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers have
+ for other</em></ins></span> apps <span class="removed"><del><strong>is
that
+<a href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.
+</p>
+</li>
+
+ <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data in smart phones, including iPhones,
Android,</strong></del></span> and
+ <span class="removed"><del><strong>BlackBerry</a>. While
there</strong></del></span> <span class="inserted"><ins><em>also core system
logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
@@ -646,34 +641,48 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is to display ads. Uses
- roughly five tracking libraries. Also, it redirects the user's
+ users. The stated purpose of the JS injection</em></ins></span> is <span
class="removed"><del><strong>not much detail here,</strong></del></span> <span
class="inserted"><ins><em>to display ads. Uses
+ roughly five tracking libraries. Also,</em></ins></span> it <span
class="removed"><del><strong>seems that</strong></del></span> <span
class="inserted"><ins><em>redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for
- tracking the user and displaying ads.</dd>
+ five tracking libraries. Developers of</em></ins></span> this <span
class="inserted"><ins><em>app have confirmed that
+ the non-premium version of the app</em></ins></span> does <span
class="removed"><del><strong>not operate via</strong></del></span> <span
class="inserted"><ins><em>JavaScript injection for
+ tracking</em></ins></span> the <span
class="removed"><del><strong>universal back door that we know nearly
all</strong></del></span> <span class="inserted"><ins><em>user and displaying
ads.</dd>
</dl>
</li>
<li id="M201611150">
- <p>Some portable phones <a
-
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ <p>Some</em></ins></span> portable phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>bugs in the phones' radio
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em>data to China</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+<li>
+<p>A half-blind security critique of a tracking app: it found
that</strong></del></span>
- <li id="M201606050">
- <p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <span class="inserted"><ins><em><li id="M201606050">
+ <p>Facebook's new Magic Photo app</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+blatant flaws allowed anyone</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who is
- in the frame.</p>
+ and suggests you</em></ins></span> to <span
class="removed"><del><strong>snoop on a user's personal data</a>.
+The critique fails entirely</strong></del></span> <span
class="inserted"><ins><em>share the picture you take
according</em></ins></span> to <span class="removed"><del><strong>express
concern that</strong></del></span> <span class="inserted"><ins><em>who is
+ in</em></ins></span> the <span class="removed"><del><strong>app
sends</strong></del></span> <span class="inserted"><ins><em>frame.</p>
<p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ known-faces database, which means</em></ins></span> the
+<span class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span
class="removed"><del><strong>a server, where</strong></del></span> <span
class="inserted"><ins><em>be
+ sent across</em></ins></span> the <span
class="removed"><del><strong><em>developer</em> gets it all.
+This “service” is for suckers!</p>
+
+<p>The server surely has a “privacy
policy,”</strong></del></span> <span class="inserted"><ins><em>wire to
Facebook's servers</em></ins></span> and <span
class="removed"><del><strong>surely it
+is worthless since nearly</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
@@ -681,7 +690,7 @@
</li>
<li id="M201605310">
- <p>Facebook's app listens all the time, <a
+ <p>Facebook's app listens</em></ins></span> all <span
class="inserted"><ins><em>the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
it may be analyzing people's conversations to serve them with targeted
@@ -691,9 +700,8 @@
<li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server
accounts,</em></ins></span>
- it
-<span class="removed"><del><strong>is worthless since nearly all
of</strong></del></span> <span class="inserted"><ins><em>can
alter</em></ins></span> them <span
class="removed"><del><strong>are.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
+ spy on many sorts</em></ins></span> of <span
class="inserted"><ins><em>data in the phone, and in server accounts,
+ it can alter</em></ins></span> them <span
class="removed"><del><strong>are.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Apps</strong></del></span>
@@ -706,14 +714,14 @@
such as Facebook, Google+ and Twitter.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% and
47%</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% and 47%
of mobile applications, both from Android and iOS
+ respectively <a href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
<span class="inserted"><ins><em><li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>mobile applications, both from Android and iOS
- respectively</strong></del></span> <span class="inserted"><ins><em>monitoring
- people through “their” phones is</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their users with third
parties.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
proprietary software to make sure they can't “fool”
the monitoring</a>.</p></em></ins></span>
</li>
@@ -731,14 +739,14 @@
to say “zero price” is “gratis.”</p>
<p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
+ legitimate, but is that valid? Software developers have no <span
class="removed"><del><strong>right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>right to
analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510300">
+ <li id="M201510300">
<p>More than 73% and 47% of mobile applications, from Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
@@ -812,10 +820,12 @@
<p>Don't be distracted by the question of whether the app developers
get users to say “I agree”. That is no excuse for
- malware.</p>
+ malware.</p></em></ins></span>
</li>
- <li id="M201411260">
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201411260">
<p>Many</em></ins></span> proprietary apps for mobile devices
report which other apps the user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
@@ -924,7 +934,6 @@
devices that come with</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT mobiles-jail -->
<li id="M201210080">
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></em></ins></span>
@@ -943,7 +952,6 @@
the restriction). Fortunately, most Android</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT mobiles-tyrant -->
<li id="M201110110">
<p><a
href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile</em></ins></span> devices <span class="inserted"><ins><em>that come
with Windows 8</em></ins></span> are <span class="removed"><del><strong>not
tyrants.</p></strong></del></span> <span
class="inserted"><ins><em>tyrants</a>.</p></em></ins></span>
@@ -1009,7 +1017,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- po/malware-mobiles.ru-en.html 9 Oct 2018 13:30:41 -0000 1.40
+++ po/malware-mobiles.ru-en.html 17 Oct 2018 10:01:35 -0000 1.41
@@ -57,40 +57,48 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
<ul class="blurbs">
- <li><p>The phone network
- <a href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ <li id="M201502100">
+ <p>The phone network <a
+ href="https://ssd.eff.org/en/module/problem-mobile-phones">
tracks the movements of each phone</a>.</p>
+
<p>This is inherent in the design of the phone network: as long as
the phone is in communication with the network, there is no way
to stop the network from recording its location. Many countries
(including the US and the EU) require the network to store all
these location data for months or years.</p>
</li>
- <li><p id="universal-back-door">Almost every phone's communication processor
has
- a universal back door which
- is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used to make a phone transmit all conversations it
- hears</a>.</p>
- <p>The back
- door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+
+ <li id="M201311121">
+ <p id="universal-back-door">
+ Almost every phone's communication processor has
+ a universal back door which is <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it hears</a>.</p>
+
+ <p>The back door <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
may take the form of bugs that have gone 20 years unfixed</a>.
The choice to leave the security holes in place is morally
equivalent to writing a back door.</p>
+
<p>The back door is in the “modem processor”, whose
job is to communicate with the radio network. In most phones,
the modem processor controls the microphone. In most phones it
has the power to rewrite the software for the main processor
too.</p>
+
<p>A few phone models are specially designed so that the modem
processor does not control the microphone, and so that it can't
change the software in the main processor. They still have the
back door, but at least it is unable to turn the phone unto a
listening device.</p>
- <p>The universal back door is apparently also used to make phones
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+
+ <p>The universal back door is apparently also used to make phones <a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their movements
are tracked, and may also make the listening feature work.</p>
</li>
@@ -127,7 +135,6 @@
</ul>
<ul class="blurbs">
-<!-- INSERT mobiles-back-door -->
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
@@ -170,7 +177,6 @@
<h3 id="drm">Mobile DRM</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-dr -->
<li id="M201501030">
<p id="netflix-app-geolocation-drm">The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
@@ -189,7 +195,6 @@
bugs.</p>
<ul class="blurbs">
-<!-- INSERT mobiles-insec -->
<li id="M201807100">
<p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
@@ -322,7 +327,6 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-surv -->
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
@@ -765,7 +769,6 @@
<h3 id="jails">Mobile Jails</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-jail -->
<li id="M201210080">
<p><a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
@@ -778,7 +781,6 @@
<h3 id="tyrants">Mobile Tyrants</h3>
<ul class="blurbs">
-<!-- INSERT mobiles-tyrant -->
<li id="M201110110">
<p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile devices that come with Windows 8 are tyrants</a>.</p>
@@ -843,7 +845,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-webpages.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-webpages.de-diff.html 14 Oct 2018 11:58:30 -0000 1.9
+++ po/malware-webpages.de-diff.html 17 Oct 2018 10:01:35 -0000 1.10
@@ -67,10 +67,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
-<!-- INSERT webpages -->
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -283,7 +282,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-webpages.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-webpages.fr-en.html 14 Oct 2018 12:58:19 -0000 1.10
+++ po/malware-webpages.fr-en.html 17 Oct 2018 10:01:35 -0000 1.11
@@ -46,10 +46,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
-<!-- INSERT webpages -->
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -255,7 +254,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-webpages.ru-en.html 14 Oct 2018 13:28:28 -0000 1.11
+++ po/malware-webpages.ru-en.html 17 Oct 2018 10:01:35 -0000 1.12
@@ -46,10 +46,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
-<!-- INSERT webpages -->
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -255,7 +254,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 13:28:28 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/potential-malware.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/potential-malware.de-en.html 9 Oct 2018 13:30:41 -0000 1.6
+++ po/potential-malware.de-en.html 17 Oct 2018 10:01:35 -0000 1.7
@@ -19,10 +19,9 @@
software might use in the future for malicious purposes. We don't
have any evidence that they are in use yet.</p>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
-<!-- INSERT potential -->
<li id="M201712130">
<p>Patent applications show that Google and Amazon are interested in <a
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal">
@@ -105,7 +104,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/potential-malware.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/potential-malware.fr-en.html 9 Oct 2018 13:30:41 -0000 1.6
+++ po/potential-malware.fr-en.html 17 Oct 2018 10:01:35 -0000 1.7
@@ -19,10 +19,9 @@
software might use in the future for malicious purposes. We don't
have any evidence that they are in use yet.</p>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
-<!-- INSERT potential -->
<li id="M201712130">
<p>Patent applications show that Google and Amazon are interested in <a
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal">
@@ -105,7 +104,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/potential-malware.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.ru-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/potential-malware.ru-en.html 9 Oct 2018 13:30:41 -0000 1.6
+++ po/potential-malware.ru-en.html 17 Oct 2018 10:01:35 -0000 1.7
@@ -19,10 +19,9 @@
software might use in the future for malicious purposes. We don't
have any evidence that they are in use yet.</p>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
<ul class="blurbs">
-<!-- INSERT potential -->
<li id="M201712130">
<p>Patent applications show that Google and Amazon are interested in <a
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal">
@@ -105,7 +104,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/proprietary-back-doors.fr-en.html 9 Oct 2018 13:30:41 -0000
1.49
+++ po/proprietary-back-doors.fr-en.html 17 Oct 2018 10:01:35 -0000
1.50
@@ -46,7 +46,6 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
-<!-- INSERT spy -->
<li id="M201706202">
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
@@ -95,7 +94,6 @@
<h3 id='alter-data'>Altering user's data or settings</h3>
<ul class="blurbs">
-<!-- INSERT alter-data -->
<li id="M201809140">
<p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -203,7 +201,6 @@
<h3 id='install-delete'>Installing or deleting programs</h3>
<ul class="blurbs">
-<!-- INSERT install-delete -->
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
@@ -273,7 +270,6 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
-<!-- INSERT universal -->
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
@@ -393,7 +389,6 @@
<h3 id='other'>Other or undefined</h3>
<ul class="blurbs">
-<!-- INSERT other -->
<li id="M201711204">
<p>Intel's intentional “management engine” back door has <a
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
@@ -519,7 +514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/proprietary-back-doors.it-diff.html 9 Oct 2018 13:30:41 -0000
1.26
+++ po/proprietary-back-doors.it-diff.html 17 Oct 2018 10:01:36 -0000
1.27
@@ -35,7 +35,9 @@
<p>Here are examples of demonstrated back doors in proprietary <span
class="removed"><del><strong>software.</p>
<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software.
-They are sorted out according</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>what they are
known to allow. Back doors
+They are sorted out according</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>what they
are known to allow. Back doors
that allow full control over the operating system are said to be
“universal”.</p>
@@ -60,10 +62,7 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
-<!-- INSERT spy</em></ins></span> -->
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201706202"></em></ins></span>
+ <li id="M201706202"></em></ins></span>
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring <span
class="removed"><del><strong>backdoor—they</strong></del></span> <span
class="inserted"><ins><em>back door—they</em></ins></span> have login
accounts with hard-coded passwords, which can't be changed, and <a
@@ -131,7 +130,6 @@
<h3 id='alter-data'>Altering user's data or settings</h3>
<ul class="blurbs">
-<!-- INSERT alter-data -->
<li id="M201809140">
<p>Android has</em></ins></span> a <span
class="removed"><del><strong>surprise. Nonfree software</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -160,16 +158,16 @@
<span class="removed"><del><strong><li>
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
+ universal back door in the application processor, for
+ Xiaomi's use</a>.</p>
+
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
universal</strong></del></span>
<span class="inserted"><ins><em><li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have a</em></ins></span> back door <span
class="removed"><del><strong>in the application
processor,</strong></del></span> for
- <span class="removed"><del><strong>Xiaomi's use</a>.</p>
-
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door</strong></del></span> <span
class="inserted"><ins><em>changing settings</em></ins></span> in <span
class="removed"><del><strong>the modem processor that the local
+ Some D-Link routers</a> have a</em></ins></span> back door <span
class="inserted"><ins><em>for changing settings</em></ins></span> in <span
class="removed"><del><strong>the modem processor that the local
phone company can use</a>.</p>
</li>
@@ -360,7 +358,6 @@
<h3 id='install-delete'>Installing or deleting programs</h3>
<ul class="blurbs">
-<!-- INSERT install-delete -->
<li id="M201804010">
<p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones</strong></del></span>
@@ -479,7 +476,6 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
-<!-- INSERT universal -->
<li id="M201711244"></em></ins></span>
<p>The <span class="removed"><del><strong>Kindle-Swindle
also</strong></del></span> <span class="inserted"><ins><em>Furby
Connect</em></ins></span> has a <a <span
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"></em></ins></span>
@@ -491,14 +487,14 @@
<p>HP “storage appliances” that use</strong></del></span>
<span class="inserted"><ins><em>If</em></ins></span> the <span
class="removed"><del><strong>proprietary
“Left Hand” operating system have back doors that give
HP <a
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"></strong></del></span>
<span class="inserted"><ins><em>product as shipped doesn't act as a
- listening device,</em></ins></span> remote <span
class="removed"><del><strong>login access</a></strong></del></span> <span
class="inserted"><ins><em>changes</em></ins></span> to <span
class="removed"><del><strong>them. HP claims</strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it
+ listening device,</em></ins></span> remote <span
class="removed"><del><strong>login access</a></strong></del></span> <span
class="inserted"><ins><em>changes</em></ins></span> to <span
class="removed"><del><strong>them. HP claims that this
does</strong></del></span> <span class="inserted"><ins><em>the code could
surely convert it
into one.</p>
</li>
<li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and tethered to a server</em></ins></span>
that <span class="inserted"><ins><em>requires
+ with a universal back door, and tethered to a server that requires
a subscription</a>.</p>
</li>
@@ -506,8 +502,8 @@
<p>Tesla used software to limit the part of the battery
that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
- a universal back door in the software</a> to temporarily
increase</em></ins></span>
- this <span class="removed"><del><strong>does</strong></del></span> <span
class="inserted"><ins><em>limit.</p>
+ a universal back door in the software</a> to temporarily increase
+ this limit.</p>
<p>While remotely allowing car “owners” to use the
whole battery capacity did</em></ins></span> not <span
class="removed"><del><strong>give HP
@@ -568,7 +564,7 @@
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly
all models of mobile phones have a <a href="#universal-back-door">
- universal back door in</em></ins></span> the <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad bother
+ universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -583,7 +579,7 @@
<p>ChromeOS has a universal back
door. At least, Google says it does—in <a
href="https://www.google.com/intl/en/chromebook/termsofservice.html">
- section 4 of the EULA</a>.</p>
+ section 4 of</em></ins></span> the <span
class="inserted"><ins><em>EULA</a>.</p>
</li>
<li id="M200700001">
@@ -607,7 +603,6 @@
<h3 id='other'>Other or undefined</h3>
<ul class="blurbs">
-<!-- INSERT other -->
<li id="M201711204">
<p>Intel's intentional “management
engine”</em></ins></span> back door <span
class="removed"><del><strong>allows installation of
software changes,</strong></del></span> <span class="inserted"><ins><em>has
<a
@@ -771,7 +766,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-back-doors.ja-diff.html 9 Oct 2018 13:30:41 -0000
1.24
+++ po/proprietary-back-doors.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.25
@@ -35,15 +35,22 @@
<p>Here are examples of demonstrated back doors in proprietary <span
class="removed"><del><strong>software.</p>
<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software.
-They are sorted out according</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each
subsection</strong></del></span> <span class="inserted"><ins><em>what they are
known to allow. Back doors
+They are sorted out according</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<ul>
+ <li>
+ <p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
+ universal back door</strong></del></span> <span
class="inserted"><ins><em>what they are known to allow. Back doors
that allow full control over the operating system are said to be
“universal”.</p>
<div class="important">
-<p>If you know of an example that ought to be in this page but isn't
+<p>If you know of an example that ought to be</em></ins></span> in <span
class="inserted"><ins><em>this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>application processor, for
+ Xiaomi's use</a>.</p>
+
+ <p>This is separate from</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or two
to present the specifics.</p>
</div>
</div>
@@ -60,21 +67,13 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
-<!-- INSERT spy</em></ins></span> -->
-<span class="removed"><del><strong><ul>
- <li>
- <p>Xiaomi phones come</strong></del></span>
- <span class="inserted"><ins><em><li id="M201706202">
+ <li id="M201706202">
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
- accounts</em></ins></span> with <span class="inserted"><ins><em>hard-coded
passwords, which can't be changed, and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
- universal back door in the application processor, for
- Xiaomi's use</a>.</p>
-
- <p>This</strong></del></span>
+ accounts with hard-coded passwords, which can't be changed,
and</em></ins></span> <a <span
class="removed"><del><strong>href="#universal-back-door-phone-modem">the
+ universal</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
- there</em></ins></span> is <span class="removed"><del><strong>separate
from <a href="#universal-back-door-phone-modem">the
- universal</strong></del></span> <span class="inserted"><ins><em>no
way to delete these accounts either</a>.</p>
+ there is no way to delete these accounts either</a>.</p>
<p>Since these accounts with hard-coded passwords are impossible
to delete, this problem is not merely an insecurity; it amounts to
@@ -121,7 +120,6 @@
<h3 id='alter-data'>Altering user's data or settings</h3>
<ul class="blurbs">
-<!-- INSERT alter-data -->
<li id="M201809140">
<p>Android has</em></ins></span> a <span
class="removed"><del><strong>Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -338,7 +336,6 @@
<h3 id='install-delete'>Installing or deleting programs</h3>
<ul class="blurbs">
-<!-- INSERT install-delete -->
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
@@ -346,49 +343,49 @@
<p>We link to the article</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
</p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
+ <p>This may have improved with</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p></strong></del></span>
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ malware too</a>.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
-Windows 8 also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a back door <span class="removed"><del><strong>for remotely deleting
apps</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>that <a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files” as well as forcibly install
+ <li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
apps</a>.</p>
- <p>It is used by 14,000 Android applications.</p>
+ <p>It is used by 14,000 Android
applications.</p></em></ins></span>
</li>
- <li id="M201112080"></em></ins></span>
- <p>
-<span class="removed"><del><strong>You</strong></del></span> <span
class="inserted"><ins><em>In addition to its <a
href="#windows-update">universal back
- door</a>, Windows 8 has a back door for <a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
- remotely deleting apps</a>.</p>
+
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201112080">
+ <p> In addition to its <a href="#windows-update">universal back
+ door</a>,</em></ins></span> Windows 8 <span
class="removed"><del><strong>also</strong></del></span> has a back door for
<span class="inserted"><ins><em><a
+
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
+ remotely deleting <span class="removed"><del><strong>apps</a>.
+</p>
+
+<p>
+You</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
<p>You</em></ins></span> might well decide to let a security service
that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
But there is no excuse for <em>deleting</em> the programs, and
you
- should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.
+ should have the right to <span class="removed"><del><strong>decide who (if
anyone) to trust in this way.
</p>
<p>
As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p></strong></del></span>
- <span class="inserted"><ins><em>way.</p></em></ins></span>
+the first software</strong></del></span> <span
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span
class="removed"><del><strong>delete is Windows or iOS.
+</p></strong></del></span> <span class="inserted"><ins><em>trust in this
+ way.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -418,35 +415,15 @@
malicious so far, the point is that nobody should have such power,
which could also be used maliciously. You might well decide to
let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing it to
+ it considers malicious. But there is no excuse for <span
class="removed"><del><strong>allowing</strong></del></span> <span
class="inserted"><ins><em>allowing it to
<em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this <span class="removed"><del><strong>way.
-</p>
-</li>
-
-<li>
-<p><a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
-Samsung Galaxy devices running proprietary Android versions come with a back
-door</a> that provides remote access to the files stored on the device.
-</p></strong></del></span> <span
class="inserted"><ins><em>way.</p></em></ins></span>
+ who (if anyone) to trust in this way.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
- <p>The <span class="removed"><del><strong>Amazon
Kindle-Swindle</strong></del></span> <span
class="inserted"><ins><em>iPhone</em></ins></span> has a back door <span
class="inserted"><ins><em><a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></em></ins></span>
- that <span class="removed"><del><strong>has been
used</strong></del></span> <span class="inserted"><ins><em>allows
Apple</em></ins></span> to
-<span class="removed"><del><strong><a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"></strong></del></span>
remotely <span class="removed"><del><strong>erase books</a>. One of the
books erased was 1984, by George Orwell.
-</p>
-
-<p>Amazon responded to criticism by saying it
would</strong></del></span> delete <span class="removed"><del><strong>books only
-following orders from the state. However, that policy didn't last.
-In 2012
-it <a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
-a user's Kindle-Swindle and deleted her account</a>, then offered her
-kafkaesque “explanations.”</p></strong></del></span> <span
class="inserted"><ins><em>apps</a> which Apple considers
+ <li id="M200808110">
+ <p>The iPhone has a back door <a
+
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+ that allows Apple to remotely delete apps</a> which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have
this power because of course we can trust Apple.</p>
</li>
@@ -456,33 +433,23 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
-<!-- INSERT universal -->
- <li id="M201711244"></em></ins></span>
- <p>The <span class="removed"><del><strong>Kindle-Swindle
also</strong></del></span> <span class="inserted"><ins><em>Furby
Connect</em></ins></span> has a <a <span
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"></em></ins></span>
- universal back door</a>.
-<span class="removed"><del><strong></p>
-</li>
-
-<li>
-<p>HP “storage appliances” that use</strong></del></span>
<span class="inserted"><ins><em>If</em></ins></span> the <span
class="removed"><del><strong>proprietary
-“Left Hand” operating system have</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
into one.</p>
</li>
<li id="M201711010">
- <p>Sony has brought</em></ins></span> back <span
class="removed"><del><strong>doors that give
-HP</strong></del></span> <span class="inserted"><ins><em>its robotic pet Aibo,
this time</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-remote login access</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and tethered</em></ins></span> to <span
class="removed"><del><strong>them. HP claims</strong></del></span> <span
class="inserted"><ins><em>a server</em></ins></span> that <span
class="removed"><del><strong>this does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>requires
+ <p>Sony has brought back its robotic pet Aibo, this time <a
+
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
+ with a universal back door, and tethered to a server that requires
a subscription</a>.</p>
</li>
<li id="M201709091">
- <p>Tesla used software</em></ins></span> to <span
class="inserted"><ins><em>limit</em></ins></span> the <span
class="removed"><del><strong>customer's data,</strong></del></span> <span
class="inserted"><ins><em>part of the battery
+ <p>Tesla used software to limit the part of the battery
that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
a universal back door in the software</a> to temporarily increase
@@ -520,10 +487,10 @@
<p>This was <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP and Vista, and it seems
- that Microsoft used the same method to push the <a
+ reported in 2007</a> for XP and Vista, and</em></ins></span> it
<span class="inserted"><ins><em>seems
+ that Microsoft used the same method</em></ins></span> to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
<span class="inserted"><ins><em>push</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em><a
href="/proprietary/malware-microsoft.html#windows10-forcing">
- Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
+ Windows 10 downgrade</a> to computers running Windows
7</em></ins></span> and <span class="removed"><del><strong>you
should</strong></del></span> <span class="inserted"><ins><em>8.</p>
<p>In Windows 10, the universal back door
is no longer hidden; all “upgrades” will be <a
@@ -536,46 +503,76 @@
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
it installs “updates” automatically</a>.</p>
- <p>We have found nothing explicitly documenting the lack of any way
- to disable remote changes to the software, so we are not completely
- sure there isn't one,</em></ins></span> but <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>this seems pretty clear.</p>
+ <p>We</em></ins></span> have <span class="inserted"><ins><em>found
nothing explicitly documenting</em></ins></span> the <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>lack of any way</em></ins></span>
+ to
+<span class="removed"><del><strong>decide who (if
anyone)</strong></del></span> <span class="inserted"><ins><em>disable remote
changes</em></ins></span> to <span class="removed"><del><strong>trust
in</strong></del></span> <span class="inserted"><ins><em>the software, so we
are not completely
+ sure there isn't one, but</em></ins></span> this <span
class="removed"><del><strong>way.
+</p></strong></del></span> <span class="inserted"><ins><em>seems pretty
clear.</p></em></ins></span>
</li>
- <li id="M201412180">
- <p><a
-
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>. Nearly
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201412180"></em></ins></span>
+ <p><a <span class="removed"><del><strong>id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+Samsung Galaxy devices running proprietary</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+ A Chinese version of</em></ins></span> Android <span
class="removed"><del><strong>versions</strong></del></span> <span
class="inserted"><ins><em>has a universal back door</a>. Nearly
all models of mobile phones have a <a href="#universal-back-door">
- universal back door in</em></ins></span> the <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad bother
+ universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
<li id="M201311300">
<p><a
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
- Some applications come with MyFreeProxy, which is a universal back
- door</a> that can download programs and run them.</p>
+ Some applications</em></ins></span> come with <span
class="inserted"><ins><em>MyFreeProxy, which is</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back
+ door</a> that <span class="removed"><del><strong>provides remote
access to the files stored on the device.
+</p></strong></del></span> <span class="inserted"><ins><em>can download
programs and run them.</p></em></ins></span>
</li>
- <li id="M201202280">
- <p>ChromeOS has a universal back
- door. At least, Google says it does—in <a
- href="https://www.google.com/intl/en/chromebook/termsofservice.html">
- section 4 of the EULA</a>.</p>
+<span class="removed"><del><strong><li>
+<p>The Amazon Kindle-Swindle</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201202280">
+ <p>ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door that has been used to</strong></del></span>
+ <span class="inserted"><ins><em>door. At least, Google says it
does—in</em></ins></span> <a <span
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+remotely erase books</a>. One</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html">
+ section 4</em></ins></span> of the <span
class="removed"><del><strong>books erased was 1984, by George Orwell.
+</p>
+
+<p>Amazon responded</strong></del></span> <span
class="inserted"><ins><em>EULA</a>.</p>
</li>
<li id="M200700001">
- <p>In addition to its <a href="#swindle-eraser">book
- eraser</a>, the Kindle-Swindle has a <a
+ <p>In addition</em></ins></span> to <span
class="removed"><del><strong>criticism by saying it would delete books only
+following orders from the state. However, that policy didn't last.
+In 2012
+it</strong></del></span> <span class="inserted"><ins><em>its</em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
+a user's Kindle-Swindle and deleted her account</a>, then offered her
+kafkaesque “explanations.”</p>
+
+
+<p>The</strong></del></span> <span
class="inserted"><ins><em>href="#swindle-eraser">book
+ eraser</a>, the</em></ins></span> Kindle-Swindle <span
class="removed"><del><strong>also</strong></del></span> has a <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
- universal back door</a>.</p>
+ universal back <span class="removed"><del><strong>door</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
</li>
- <li id="M200612050">
+<span class="removed"><del><strong><li>
+<p>HP “storage appliances” that use the proprietary
+“Left Hand” operating system have</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200612050">
<p>Almost every phone's communication
- processor has a universal back door which is <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used to make a phone transmit all conversations it hears</a>.
See
+ processor has a universal</em></ins></span> back <span
class="removed"><del><strong>doors that give
+HP</strong></del></span> <span class="inserted"><ins><em>door which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a> to them. HP claims that this does not give HP
+access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used</em></ins></span> to <span class="removed"><del><strong>the
customer's data, but if the</strong></del></span> <span
class="inserted"><ins><em>make a phone transmit all conversations it
hears</a>. See
<a
href="/proprietary/malware-mobiles.html#universal-back-door">Malware
in Mobile Devices</a> for more info.</p>
</li>
@@ -585,7 +582,6 @@
<h3 id='other'>Other or undefined</h3>
<ul class="blurbs">
-<!-- INSERT other -->
<li id="M201711204">
<p>Intel's intentional “management
engine”</em></ins></span> back door <span
class="removed"><del><strong>allows installation of
software changes,</strong></del></span> <span class="inserted"><ins><em>has
<a
@@ -749,7 +745,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- po/proprietary-back-doors.ru-en.html 9 Oct 2018 13:30:41 -0000
1.51
+++ po/proprietary-back-doors.ru-en.html 17 Oct 2018 10:01:36 -0000
1.52
@@ -46,7 +46,6 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
-<!-- INSERT spy -->
<li id="M201706202">
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
@@ -95,7 +94,6 @@
<h3 id='alter-data'>Altering user's data or settings</h3>
<ul class="blurbs">
-<!-- INSERT alter-data -->
<li id="M201809140">
<p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
@@ -203,7 +201,6 @@
<h3 id='install-delete'>Installing or deleting programs</h3>
<ul class="blurbs">
-<!-- INSERT install-delete -->
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
@@ -273,7 +270,6 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
-<!-- INSERT universal -->
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
@@ -393,7 +389,6 @@
<h3 id='other'>Other or undefined</h3>
<ul class="blurbs">
-<!-- INSERT other -->
<li id="M201711204">
<p>Intel's intentional “management engine” back door has <a
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
@@ -519,7 +514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.de-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-censorship.de-en.html 12 Oct 2018 07:58:36 -0000
1.19
+++ po/proprietary-censorship.de-en.html 17 Oct 2018 10:01:36 -0000
1.20
@@ -47,7 +47,6 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-<!-- INSERT google -->
<li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
@@ -89,7 +88,6 @@
<h3 id="consoles">Game consoles</h3>
<ul class="blurbs">
-<!-- INSERT consoles -->
<li id="M201408290">
<p>The <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">
@@ -157,7 +155,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.es-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-censorship.es-en.html 12 Oct 2018 07:58:36 -0000
1.24
+++ po/proprietary-censorship.es-en.html 17 Oct 2018 10:01:36 -0000
1.25
@@ -47,7 +47,6 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-<!-- INSERT google -->
<li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
@@ -89,7 +88,6 @@
<h3 id="consoles">Game consoles</h3>
<ul class="blurbs">
-<!-- INSERT consoles -->
<li id="M201408290">
<p>The <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">
@@ -157,7 +155,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-censorship.fr-en.html 12 Oct 2018 07:58:36 -0000
1.25
+++ po/proprietary-censorship.fr-en.html 17 Oct 2018 10:01:36 -0000
1.26
@@ -47,7 +47,6 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-<!-- INSERT google -->
<li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
@@ -89,7 +88,6 @@
<h3 id="consoles">Game consoles</h3>
<ul class="blurbs">
-<!-- INSERT consoles -->
<li id="M201408290">
<p>The <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">
@@ -157,7 +155,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary-censorship.it-diff.html 12 Oct 2018 07:58:36 -0000
1.9
+++ po/proprietary-censorship.it-diff.html 17 Oct 2018 10:01:36 -0000
1.10
@@ -68,7 +68,6 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-<!-- INSERT google -->
<li id="M201703160"></em></ins></span>
<p>Google <span class="removed"><del><strong>said it would
<a
href="/proprietary/proprietary-back-doors.html#chrome-erase-addons">
@@ -118,7 +117,6 @@
<h3 id="consoles">Game consoles</h3>
<ul class="blurbs">
-<!-- INSERT consoles -->
<li id="M201408290">
<p>The <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">
@@ -188,7 +186,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ja-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/proprietary-censorship.ja-diff.html 12 Oct 2018 07:58:36 -0000
1.13
+++ po/proprietary-censorship.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.14
@@ -85,7 +85,6 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-<!-- INSERT google -->
<li id="M201703160">
<p>Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">systematically
bans apps that endorse abortion
rights or would help women find abortions</a>.</p>
@@ -139,7 +138,6 @@
<h3 id="consoles">Game consoles</h3>
<ul class="blurbs">
-<!-- INSERT consoles -->
<li id="M201408290">
<p>The</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">Nintendo</strong></del></span>
@@ -210,7 +208,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-censorship.ru-en.html 12 Oct 2018 07:58:36 -0000
1.24
+++ po/proprietary-censorship.ru-en.html 17 Oct 2018 10:01:36 -0000
1.25
@@ -47,7 +47,6 @@
<h3 id="google">Google</h3>
<ul class="blurbs">
-<!-- INSERT google -->
<li id="M201703160">
<p>Google <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
@@ -89,7 +88,6 @@
<h3 id="consoles">Game consoles</h3>
<ul class="blurbs">
-<!-- INSERT consoles -->
<li id="M201408290">
<p>The <a
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/">
@@ -157,7 +155,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-coverups.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.de-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-coverups.de-en.html 9 Oct 2018 13:30:41 -0000 1.7
+++ po/proprietary-coverups.de-en.html 17 Oct 2018 10:01:36 -0000 1.8
@@ -33,10 +33,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
<ul class="blurbs">
-<!-- INSERT coverups -->
<li id="M201612120">
<p>Price Waterhouse Coopers tried
to suppress knowledge of a security flaw by <a
@@ -104,7 +103,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-coverups.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.fr-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-coverups.fr-en.html 9 Oct 2018 13:30:41 -0000 1.8
+++ po/proprietary-coverups.fr-en.html 17 Oct 2018 10:01:36 -0000 1.9
@@ -33,10 +33,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
<ul class="blurbs">
-<!-- INSERT coverups -->
<li id="M201612120">
<p>Price Waterhouse Coopers tried
to suppress knowledge of a security flaw by <a
@@ -104,7 +103,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-coverups.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ja-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-coverups.ja-diff.html 9 Oct 2018 13:30:41 -0000
1.5
+++ po/proprietary-coverups.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.6
@@ -48,10 +48,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
<ul class="blurbs">
-<!-- INSERT coverups -->
<li id="M201612120">
<p>Price</em></ins></span> Waterhouse Coopers tried
to suppress knowledge of a security flaw by <a
@@ -120,7 +119,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-coverups.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ru-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-coverups.ru-en.html 9 Oct 2018 13:30:41 -0000 1.8
+++ po/proprietary-coverups.ru-en.html 17 Oct 2018 10:01:36 -0000 1.9
@@ -33,10 +33,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
<ul class="blurbs">
-<!-- INSERT coverups -->
<li id="M201612120">
<p>Price Waterhouse Coopers tried
to suppress knowledge of a security flaw by <a
@@ -104,7 +103,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-deception.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-deception.fr-en.html 9 Oct 2018 13:30:41 -0000 1.17
+++ po/proprietary-deception.fr-en.html 17 Oct 2018 10:01:36 -0000 1.18
@@ -32,10 +32,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
-<!-- INSERT deception -->
<li id="M201611060">
<p><a
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
@@ -147,7 +146,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-deception.ja-diff.html 9 Oct 2018 13:30:41 -0000
1.10
+++ po/proprietary-deception.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.11
@@ -47,10 +47,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
-<!-- INSERT deception -->
<li id="M201611060">
<p><a</em></ins></span>
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
@@ -71,9 +70,9 @@
<p>The</em></ins></span> proprietor of the Pokémon Go game <a
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business">
invites restaurants and other businesses to pay to have the game lure
- people <span
class="removed"><del><strong>there</a>.</strong></del></span> <span
class="inserted"><ins><em>there</a>.</p></em></ins></span>
+ people <span class="removed"><del><strong>there</a>.
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p>“Dark patterns”
are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings
@@ -81,9 +80,9 @@
<p>This allows a company such as Apple to say, “We allow
users to turn this off” while ensuring that few will
- understand how to actually turn it off.</p>
+ understand how to actually turn it off.</p></strong></del></span>
<span class="inserted"><ins><em>there</a>.</p></em></ins></span>
</li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201511110"></em></ins></span>
<p>A top-ranking proprietary Instagram client promising
@@ -182,7 +181,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-deception.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-deception.ru-en.html 9 Oct 2018 13:30:41 -0000 1.16
+++ po/proprietary-deception.ru-en.html 17 Oct 2018 10:01:36 -0000 1.17
@@ -32,10 +32,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
-<!-- INSERT deception -->
<li id="M201611060">
<p><a
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
@@ -147,7 +146,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-drm.fr-en.html 9 Oct 2018 13:30:41 -0000 1.25
+++ po/proprietary-drm.fr-en.html 17 Oct 2018 10:01:36 -0000 1.26
@@ -42,10 +42,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
-<!-- INSERT drm -->
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -338,7 +337,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-drm.it-diff.html 9 Oct 2018 13:30:41 -0000 1.16
+++ po/proprietary-drm.it-diff.html 17 Oct 2018 10:01:36 -0000 1.17
@@ -57,10 +57,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
-<!-- INSERT drm -->
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -436,7 +435,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-drm.ja-diff.html 9 Oct 2018 13:30:41 -0000 1.17
+++ po/proprietary-drm.ja-diff.html 17 Oct 2018 10:01:36 -0000 1.18
@@ -58,10 +58,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
-<!-- INSERT drm -->
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -226,10 +225,10 @@
<span class="inserted"><ins><em><li id="M201501030">
<p id="netflix-app-geolocation-drm">The Netflix Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="#bluray">Bluray</a>
-disks. (The article talks about how</strong></del></span>
+disks. (The article talks about how the same malware would later be
+introduced in MacOS. That had not been done at</strong></del></span>
<span
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
- forces</em></ins></span> the <span class="removed"><del><strong>same
malware would later be
-introduced in MacOS. That had not been done at the time, but it was
+ forces</em></ins></span> the <span class="removed"><del><strong>time, but
it was
done subsequently.)
</p>
</li>
@@ -292,10 +291,12 @@
<p>Every Bluray disk (with few, rare exceptions) has DRM—so
don't use Bluray <span class="removed"><del><strong>disks!
-</p></strong></del></span> <span
class="inserted"><ins><em>disks!</p>
+</p></strong></del></span> <span
class="inserted"><ins><em>disks!</p></em></ins></span>
</li>
- <li id="M201102250">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201102250">
<p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">
contains facilities specifically to support DRM</a>.</p>
@@ -316,12 +317,10 @@
<p>The fundamental cause of this harassment, and the fundamental
wrong of the DRM in DVDs, is the requirement to use nonfree software
- to play the DVD. Fortunately we have free replacement
software.</p></em></ins></span>
+ to play the DVD. Fortunately we have free replacement software.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200811210"></em></ins></span>
+ <li id="M200811210"></em></ins></span>
<p><a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"></em></ins></span>
DRM <span class="inserted"><ins><em>(digital restrictions
mechanisms)</em></ins></span> in <span class="removed"><del><strong>Cars Will
Drive Consumers Crazy</a>.
@@ -425,7 +424,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/proprietary-drm.ru-en.html 9 Oct 2018 13:30:41 -0000 1.26
+++ po/proprietary-drm.ru-en.html 17 Oct 2018 10:01:36 -0000 1.27
@@ -42,10 +42,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
-<!-- INSERT drm -->
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -338,7 +337,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-incompatibility.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.fr-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary-incompatibility.fr-en.html 9 Oct 2018 13:30:41 -0000
1.9
+++ po/proprietary-incompatibility.fr-en.html 17 Oct 2018 10:01:36 -0000
1.10
@@ -38,10 +38,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
<ul class="blurbs">
-<!-- INSERT incompatibility -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -132,7 +131,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-incompatibility.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.ru-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary-incompatibility.ru-en.html 9 Oct 2018 13:30:41 -0000
1.9
+++ po/proprietary-incompatibility.ru-en.html 17 Oct 2018 10:01:36 -0000
1.10
@@ -38,10 +38,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
<ul class="blurbs">
-<!-- INSERT incompatibility -->
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
@@ -132,7 +131,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/proprietary-insecurity.fr-en.html 9 Oct 2018 13:30:41 -0000
1.64
+++ po/proprietary-insecurity.fr-en.html 17 Oct 2018 10:01:36 -0000
1.65
@@ -48,10 +48,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
-<!-- INSERT insecurity -->
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
@@ -630,7 +629,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-insecurity.it-diff.html 9 Oct 2018 13:30:41 -0000
1.19
+++ po/proprietary-insecurity.it-diff.html 17 Oct 2018 10:01:36 -0000
1.20
@@ -66,10 +66,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
-<ul class="blurbs">
-<!-- INSERT insecurity --></em></ins></span>
+<ul class="blurbs"></em></ins></span>
<li <span class="removed"><del><strong>id="break-security-smarttv">
<p><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
@@ -237,7 +236,8 @@
<span class="inserted"><ins><em><li id="M201705160">
<p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models</em></ins></span> of <span
class="removed"><del><strong>Stings hospital disinfectant
dishwasher</strong></del></span> <span class="inserted"><ins><em>HP laptops
logged the user's keystroke
+ pre-installed on 28 models</em></ins></span> of <span
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
+<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> <span class="inserted"><ins><em>HP laptops logged the
user's keystroke
to a file in the filesystem. Any process with access to the filesystem
or the MapViewOfFile API could gain access to the log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
@@ -262,9 +262,9 @@
<li id="M201703270">
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher</em></ins></span> is <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected</em></ins></span> to the Internet, its security is
crap</a>.</p>
+ Stings hospital disinfectant dishwasher is <a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to</em></ins></span> the Internet, its security is
crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
filesystem, infect it with malware, and force the dishwasher to launch
@@ -738,18 +738,18 @@
from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your <span class="removed"><del><strong>rights.
-</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>rights.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>, and it can be
fatal.</p>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p></em></ins></span>
</li>
- <li id="M201402210">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201402210">
<p>The <a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
of WhatsApp</a> makes eavesdropping a snap.</p>
@@ -915,7 +915,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- po/proprietary-insecurity.ja-diff.html 9 Oct 2018 13:30:41 -0000
1.38
+++ po/proprietary-insecurity.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.39
@@ -86,10 +86,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
-<!-- INSERT insecurity -->
<li id="M201809240">
<p>Researchers have discovered how to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
<span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
@@ -108,33 +107,30 @@
<li>
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages are not entirely deleted</a>. They
can</strong></del></span> <span class="inserted"><ins><em>listening
device</a> for them.</p>
+WhatsApp messages</strong></del></span> <span
class="inserted"><ins><em>listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>recovered
-in various ways.
-</p>
-</li>
-
-<li>
-<p>A vulnerability</strong></del></span> <span
class="inserted"><ins><em>much
+ <p>It was very difficult for them to do this. The job would be much
easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product</em></ins></span> in
<span class="removed"><del><strong>Apple's Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>that country,
- do you think Amazon would have the moral fiber</em></ins></span> to <span
class="inserted"><ins><em>say no?</p>
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not entirely deleted</a>.
They</strong></del></span> <span class="inserted"><ins><em>probably hackers
too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
“hacking” to mean “breaking
security”</a>.</p>
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all the other voice-control systems can be <a
+ <p>Siri, Alexa, and all the other voice-control
systems</em></ins></span> can be <span
class="removed"><del><strong>recovered</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked by programs that play commands in ultrasound that humans
- can't hear</a>.</p>
+ hijacked by programs that play commands</em></ins></span> in <span
class="removed"><del><strong>various ways.
+</p></strong></del></span> <span class="inserted"><ins><em>ultrasound
that humans
+ can't hear</a>.</p></em></ins></span>
</li>
- <li id="M201807020">
+<span class="removed"><del><strong><li>
+<p>A vulnerability</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos to people in the owner's contact list</a>.</p>
@@ -351,9 +347,10 @@
</li>
<li id="M201607220">
- <p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
+ <p>A vulnerability</em></ins></span> in Apple's Image I/O API
allowed an attacker to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious code</em></ins></span> from any application which uses this API
to render a
+ <span class="removed"><del><strong>malacious</strong></del></span>
+ <span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
certain kind of image file</a>.</p>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -871,7 +868,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/proprietary-insecurity.ru-en.html 9 Oct 2018 13:30:41 -0000
1.63
+++ po/proprietary-insecurity.ru-en.html 17 Oct 2018 10:01:36 -0000
1.64
@@ -48,10 +48,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
-<!-- INSERT insecurity -->
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
@@ -630,7 +629,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-interference.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.fr-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-interference.fr-en.html 14 Oct 2018 12:58:19 -0000
1.25
+++ po/proprietary-interference.fr-en.html 17 Oct 2018 10:01:36 -0000
1.26
@@ -33,10 +33,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
<ul class="blurbs">
-<!-- INSERT interference -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -229,7 +228,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-interference.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-interference.ja-diff.html 14 Oct 2018 11:58:30 -0000
1.11
+++ po/proprietary-interference.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.12
@@ -48,10 +48,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
<ul class="blurbs">
-<!-- INSERT interference -->
<li id="M201809120">
<p>One version of</em></ins></span> Windows <span
class="removed"><del><strong>10's</strong></del></span> <span
class="inserted"><ins><em>10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -64,10 +63,12 @@
blatantly disregards user choice and privacy</a>.</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
included a “miner”</a>, i.e. an executable that hijacks
- the CPU in users' computers to mine a cryptocurrency.</p>
+ the CPU in users' computers to mine a
cryptocurrency.</p></em></ins></span>
</li>
- <li id="M201805080">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
inject a “miner” in web pages</a> served to visitors.
This
@@ -82,12 +83,10 @@
href="/software/librejs/index.html">LibreJS</a>. Some
browser extensions that <a
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
- specifically block JavaScript miners</a> are also
available.</p></em></ins></span>
+ specifically block JavaScript miners</a> are also
available.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804180">
+ <li id="M201804180">
<p>Pearson's proprietary educational software <a
href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784">
did an experiment on real students</a>, treating students differently
@@ -125,22 +124,22 @@
<p>The article's author starts from the premise that Microsoft has
a right</em></ins></span> to <span
class="removed"><del><strong>install</strong></del></span> <span
class="inserted"><ins><em>control what</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.</p></strong></del></span>
<span class="inserted"><ins><em>does to users, as long as it doesn't
- go “too far”. We disagree.</p></em></ins></span>
+ go “too far”. We disagree.</p>
+ </li>
+
+ <li id="M201701110">
+ <p>An upgrade package for Acrobat Reader <a
+
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">silently
+ alters Chrome</a>.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Microsoft</strong></del></span>
- <span class="inserted"><ins><em><li id="M201701110">
- <p>An upgrade package for Acrobat Reader</em></ins></span> <a
<span
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
+ <span class="inserted"><ins><em><li id="M201608170">
+ <p> After</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
tricking users</a> <a
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
-into replacing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/">silently
- alters Chrome</a>.</p>
- </li>
-
- <li id="M201608170">
- <p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download of Windows 10</a>
+into replacing</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html#windows10-forcing">forcing
the download of Windows 10</a>
on computers that were running</em></ins></span> Windows 7 <span
class="removed"><del><strong>with</strong></del></span> <span
class="inserted"><ins><em>and 8, Microsoft <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
repeatedly switched on a flag that urged users to
@@ -287,7 +286,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-interference.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru-en.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/proprietary-interference.ru-en.html 14 Oct 2018 13:28:28 -0000
1.26
+++ po/proprietary-interference.ru-en.html 17 Oct 2018 10:01:36 -0000
1.27
@@ -33,10 +33,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
<ul class="blurbs">
-<!-- INSERT interference -->
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
@@ -229,7 +228,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 13:28:28 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-jails.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-jails.fr-en.html 9 Oct 2018 13:30:41 -0000 1.22
+++ po/proprietary-jails.fr-en.html 17 Oct 2018 10:01:36 -0000 1.23
@@ -69,7 +69,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -179,7 +178,6 @@
<h3 id="microsoft">Microsoft jails</h3>
<ul class="blurbs">
-<!-- INSERT microsoft -->
<li id="M201706130">
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -266,7 +264,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-jails.it-diff.html 9 Oct 2018 13:30:42 -0000 1.16
+++ po/proprietary-jails.it-diff.html 17 Oct 2018 10:01:36 -0000 1.17
@@ -95,7 +95,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple -->
<li id="M201710130"></em></ins></span>
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -288,15 +287,16 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p>
+ admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li></strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id="microsoft">Microsoft jails</h3>
<ul class="blurbs">
-<!-- INSERT microsoft -->
<li id="M201706130">
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -307,12 +307,10 @@
10 S is a special configuration of Windows 10 called <a
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">
S mode</a>. The major difference with Windows 10 S is that there is
- an easy way to switch out of S mode.</p></em></ins></span>
+ an easy way to switch out of S mode.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210080"></em></ins></span>
+ <li id="M201210080"></em></ins></span>
<p><a
<span
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
@@ -394,7 +392,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-jails.ja-diff.html 9 Oct 2018 13:30:42 -0000 1.16
+++ po/proprietary-jails.ja-diff.html 17 Oct 2018 10:01:36 -0000 1.17
@@ -97,7 +97,6 @@
<span class="inserted"><ins><em><h4>Examples of censorship by Apple
jails</h4>
<ul class="blurbs">
-<!-- INSERT apple -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -133,12 +132,10 @@
<li id="M201701050">
<p>Apple used its censorship system to enforce China's censorship
<a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by blocking distribution of the New York Times
app</a>.</p></em></ins></span>
+ by blocking distribution of the New York Times app</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605190">
+ <li id="M201605190">
<p>Apple censors games, <a
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
banning some games from the cr…app store</a> because of which
@@ -160,10 +157,12 @@
<p>This particular political slant <a
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple services</a>.</p>
+ affects other Apple services</a>.</p></em></ins></span>
</li>
- <li id="M201506250"></em></ins></span>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506250"></em></ins></span>
<p>Apple has banned iThing
applications that show the confederate flag. <a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
@@ -216,7 +215,6 @@
<h3 id="microsoft">Microsoft jails</h3>
<ul class="blurbs">
-<!-- INSERT microsoft -->
<li id="M201706130">
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -312,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-jails.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/proprietary-jails.ru-en.html 9 Oct 2018 13:30:42 -0000 1.23
+++ po/proprietary-jails.ru-en.html 17 Oct 2018 10:01:36 -0000 1.24
@@ -69,7 +69,6 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
-<!-- INSERT apple -->
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -179,7 +178,6 @@
<h3 id="microsoft">Microsoft jails</h3>
<ul class="blurbs">
-<!-- INSERT microsoft -->
<li id="M201706130">
<p>Windows 10 S was a jail: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">
@@ -266,7 +264,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/proprietary-sabotage.fr-en.html 10 Oct 2018 10:57:51 -0000 1.49
+++ po/proprietary-sabotage.fr-en.html 17 Oct 2018 10:01:36 -0000 1.50
@@ -31,10 +31,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
-<!-- INSERT sabotage -->
<li id="M201807050">
<p>The Jawbone fitness tracker was tethered to a proprietary phone
app. In 2017, the company shut down and made the app stop working. <a
@@ -520,7 +519,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 10:57:51 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-sabotage.it-diff.html 10 Oct 2018 07:58:36 -0000
1.17
+++ po/proprietary-sabotage.it-diff.html 17 Oct 2018 10:01:36 -0000
1.18
@@ -46,10 +46,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
-<!-- INSERT sabotage -->
<li id="M201807050">
<p>The Jawbone fitness tracker was tethered to a proprietary phone
app. In 2017, the company shut down and made the app stop working. <a
@@ -687,7 +686,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- po/proprietary-sabotage.ja-diff.html 10 Oct 2018 07:58:36 -0000
1.21
+++ po/proprietary-sabotage.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.22
@@ -44,10 +44,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
-<!-- INSERT sabotage -->
<li id="M201807050">
<p>The Jawbone fitness tracker was tethered to a proprietary phone
app. In 2017, the company shut down and made the app stop working. <a
@@ -673,7 +672,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/10 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-sabotage.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru-en.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/proprietary-sabotage.ru-en.html 11 Oct 2018 06:59:25 -0000 1.48
+++ po/proprietary-sabotage.ru-en.html 17 Oct 2018 10:01:36 -0000 1.49
@@ -31,10 +31,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
-<!-- INSERT sabotage -->
<li id="M201807050">
<p>The Jawbone fitness tracker was tethered to a proprietary phone
app. In 2017, the company shut down and made the app stop working. <a
@@ -520,7 +519,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/11 06:59:25 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-subscriptions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/proprietary-subscriptions.fr-en.html 9 Oct 2018 13:30:42 -0000
1.13
+++ po/proprietary-subscriptions.fr-en.html 17 Oct 2018 10:01:36 -0000
1.14
@@ -36,10 +36,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
<ul class="blurbs">
-<!-- INSERT subscriptions -->
<li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
@@ -142,7 +141,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-subscriptions.ja-diff.html 9 Oct 2018 13:30:42 -0000
1.8
+++ po/proprietary-subscriptions.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.9
@@ -51,10 +51,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
<ul class="blurbs">
-<!-- INSERT subscriptions -->
<li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
@@ -158,7 +157,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-subscriptions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-subscriptions.ru-en.html 9 Oct 2018 13:30:42 -0000
1.12
+++ po/proprietary-subscriptions.ru-en.html 17 Oct 2018 10:01:36 -0000
1.13
@@ -36,10 +36,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
<ul class="blurbs">
-<!-- INSERT subscriptions -->
<li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
@@ -142,7 +141,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- po/proprietary-surveillance.fr-en.html 7 Oct 2018 22:29:14 -0000
1.125
+++ po/proprietary-surveillance.fr-en.html 17 Oct 2018 10:01:36 -0000
1.126
@@ -179,7 +179,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT windows -->
<li id="M201712110">
<p>HP's proprietary operating system <a
href="http://www.bbc.com/news/technology-42309371">includes a
@@ -345,7 +344,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT macos -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -408,7 +406,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT bios -->
<li id="M201509220">
<p><a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
@@ -435,7 +432,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT phones -->
<li id="M201601110">
<p>The natural extension of monitoring
people through “their” phones is <a
@@ -483,7 +479,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT ithings -->
<li id="M201711250">
<p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
@@ -606,7 +601,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT android -->
<li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
@@ -700,7 +694,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT e-readers -->
<li id="M201603080">
<p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
@@ -742,7 +735,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT apps -->
<li id="M201808030">
<p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
@@ -1145,7 +1137,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT skype -->
<li id="M201307110">
<p>Skype contains <a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
@@ -1162,7 +1153,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT games -->
<li id="M201806240">
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
@@ -1244,7 +1234,6 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-<!-- INSERT stings -->
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -1269,7 +1258,6 @@
before Amazon “smart” TVs.</p>
<ul class="blurbs">
-<!-- INSERT tvsets -->
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
@@ -1419,7 +1407,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT cameras -->
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
@@ -1443,7 +1430,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT toys -->
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
@@ -1526,7 +1512,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT drones -->
<li id="M201708040">
<p>While you're using a DJI drone
to snoop on other people, DJI is in many cases <a
@@ -1541,7 +1526,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT home -->
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -1595,7 +1579,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT wearables -->
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
@@ -1610,7 +1593,6 @@
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
-<!-- INSERT watches -->
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
@@ -1635,7 +1617,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT cars -->
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -1698,7 +1679,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT virtual -->
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
creates the potential for the most intimate
@@ -1728,7 +1708,6 @@
but the surveillance is an abuse all the same.</p>
<ul class="blurbs">
-<!-- INSERT websites -->
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
@@ -1794,7 +1773,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT javascript -->
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -1835,7 +1813,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT flash -->
<li id="M201310110">
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
@@ -1856,7 +1833,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT chrome -->
<li id="M201507280">
<p>Google Chrome makes it easy for an extension to do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
@@ -1892,7 +1868,6 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-<!-- INSERT networks -->
<li id="M201606030">
<p>Investigation Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
@@ -1969,7 +1944,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/07 22:29:14 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/proprietary-surveillance.it-diff.html 7 Oct 2018 22:29:14 -0000
1.75
+++ po/proprietary-surveillance.it-diff.html 17 Oct 2018 10:01:36 -0000
1.76
@@ -220,7 +220,6 @@
files</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT windows -->
<li id="M201712110">
<p>HP's proprietary operating system <a
href="http://www.bbc.com/news/technology-42309371">includes a
@@ -313,7 +312,8 @@
<p>To use proprietary software is to invite such treatment.</p>
</li>
- <span class="removed"><del><strong><li><p></strong></del></span>
+ <span class="removed"><del><strong><li><p>
+ Windows 10</strong></del></span>
<span class="inserted"><ins><em><li id="M201508180">
<p><a
@@ -324,8 +324,8 @@
<li id="M201508130">
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
- Windows 10 <span class="inserted"><ins><em>sends identifiable information
to Microsoft</a>, even if
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+ Windows 10 sends identifiable information to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
the privacy-protection settings.</p>
</li>
@@ -425,7 +425,6 @@
edited</a>. The</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT macos -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
@@ -503,15 +502,27 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT bios -->
<li id="M201509220"></em></ins></span>
<p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90%</strong></del></span> <span
class="inserted"><ins><em>the specific
- sabotage method Lenovo used did not affect GNU/Linux; also, a
- “clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of</strong></del></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
+ sabotage method Lenovo used did</em></ins></span> not <span
class="removed"><del><strong>in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>affect
GNU/Linux; also, a
+ “clean” Windows install</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps for BART</strong></del></span> <span
class="inserted"><ins><em>not really clean since</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft
puts in its
own malware</a>.</p>
</li>
</ul>
@@ -519,7 +530,9 @@
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With</strong></del></span> <span
class="inserted"><ins><em>Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -530,23 +543,41 @@
</div>
<ul class="blurbs">
-<!-- INSERT phones -->
<li id="M201601110">
<p>The natural extension of monitoring
people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
- the monitoring</a>.</p>
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
+ proprietary <span class="removed"><del><strong>apps, one can only hope
that</strong></del></span> <span class="inserted"><ins><em>software to make
sure</em></ins></span> they <span
class="removed"><del><strong>don't.</p></strong></del></span> <span
class="inserted"><ins><em>can't “fool”
+ the monitoring</a>.</p></em></ins></span>
</li>
- <li id="M201510050">
- <p>According to Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users by
+ <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510050">
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>ultrasound from beacons placed in stores or played
by TV programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs of Android apps</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
+ href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>collude</strong></del></span> <span
class="inserted"><ins><em>take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on and off, listen to the microphone,
- retrieve geo-location data from the GPS, take photographs, read
+ them</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>turn the
phones on and off, listen</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that collude</a>.</p>
+</li>
+
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed to disguise itself
+ read</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not
enough</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware is designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -555,19 +586,35 @@
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via
- the universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There are <a
+ detail here, it seems that</em></ins></span> this <span
class="removed"><del><strong>point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>does not
operate via</em></ins></span>
+ the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they</strong></del></span> <span class="inserted"><ins><em>we know nearly
all portable
+ phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio software</a>.</p>
+ lots</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal
information</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in the <span
class="removed"><del><strong>first
+place!</p></strong></del></span> <span class="inserted"><ins><em>phones'
radio software</a>.</p></em></ins></span>
</li>
- <li id="M201307000">
- <p>Portable phones with GPS <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android)</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307000">
+ <p>Portable phones with GPS</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
+
+ <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
+ disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
+ yet another example of nonfree software pretending</strong></del></span>
+ <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
</li>
</ul>
@@ -578,45 +625,126 @@
</div>
<ul class="blurbs">
-<!-- INSERT ithings -->
<li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
+ <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>user,
+ when it's actually doing something else. Such a
thing</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ this</em></ins></span> would <span class="removed"><del><strong>be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>require circumventing the iOS
DRM.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In</em></ins></span> the <span class="removed"><del><strong>most
popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>latest
iThings system,
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
</li>
- <li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ <li><p>“Cryptic communication,” unrelated
to</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The
clear</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced</em></ins></span>
way <span class="removed"><del><strong>to say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>really does turn
+ them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on the average.</p>
</li>
+ <li><p>Spyware is present in some Android devices when they are
sold.
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>you—“We
+ know you want</em></ins></span> to <span class="removed"><del><strong>any
file on the system.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201702150">
- <p>Apple proposes <a
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>Apple</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702150">
+ <p>Apple</em></ins></span> proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
+ fingerprint-scanning touch <span
class="removed"><del><strong>screen</a>
+ — which</strong></del></span> <span
class="inserted"><ins><em>screen</a>—which</em></ins></span> would
mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether the phone is snooping on them.</p>
+ no way to tell whether the phone is snooping on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>them.</p>
</li>
<li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
- <li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the photos
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address and receiving the code Apple
+ sends to it.</p>
+ </li>
+
+ <li><p>Around 47% of the most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p>
+ </li>
+
+ <li><p>iThings</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509240">
+ <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
take, and keeps them up to date on all your devices. Any edits you
- make are automatically updated everywhere. […]
</p></blockquote>
+ make are automatically updated everywhere. <span
class="removed"><del><strong>[...]</strong></del></span> <span
class="inserted"><ins><em>[…]</em></ins></span>
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
@@ -632,8 +760,12 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ security to get at them, but NSA can access any of them through <a
<span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:
+ the <a class="not-a-duplicate"</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
@@ -658,13 +790,15 @@
</li>
<li id="M201401100">
- <p>The <a class="not-a-duplicate"
+ <p>The <a class="not-a-duplicate"</em></ins></span>
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
- <li id="M201312300">
+ <span
class="removed"><del><strong><li><p>There</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
Either Apple helps the NSA snoop on all the data in an iThing, or it
@@ -679,139 +813,195 @@
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track users, which is
<a
+ <p>There</em></ins></span> is also a feature for web sites to track
users, which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
- <li id="M201204280">
- <p>Users cannot make an Apple ID (<a
+ <span class="removed"><del><strong><li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201204280">
+ <p>Users cannot make an</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
- email address and receiving the verification code Apple sends
- to it.</p>
+ email address</em></ins></span> and <span
class="removed"><del><strong>regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either</strong></del></span> <span
class="inserted"><ins><em>verification code</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span>
+ to <span class="removed"><del><strong>exist for no
+ possible purpose other than surveillance</a>. Here is the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInAndroid">Android Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware
in</strong></del></span> <span
class="inserted"><ins><em>id="SpywareInAndroid">Android</em></ins></span>
Telephones</h4>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
-<!-- INSERT android -->
+<span class="removed"><del><strong><ul>
+ <li><p>According to Edward Snowden,</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711210">
- <p>Android tracks location for Google <a
-
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even when
- the phone has no SIM card</a>.</p>
+ <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to
turn</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
when</em></ins></span>
+ the <span class="inserted"><ins><em>phone has no SIM
card</a>.</p>
</li>
<li id="M201611150">
- <p>Some portable phones <a
+ <p>Some portable</em></ins></span> phones
+ <span class="removed"><del><strong>on and off,
listen</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ sold with spyware sending lots of data</em></ins></span> to <span
class="inserted"><ins><em>China</a>.</p>
</li>
<li id="M201609140">
- <p>Google Play (a component</em></ins></span> of <span
class="inserted"><ins><em>Android) <a
+ <p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the <span class="removed"><del><strong>top-ranked
gratis
- proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>users' movements
without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most</strong></del></span> <span class="inserted"><ins><em>tracking.
This is
- yet another example</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span class="inserted"><ins><em>nonfree
software pretending to obey</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>user,
+ tracks</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
+ GPS, take photographs, read text messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>users' movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
+ disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>tracking.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span>
+ <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p></strong></del></span> <span
class="inserted"><ins><em>obey the user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Samsung</strong></del></span>
<span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</em></ins></span>
- that <span class="inserted"><ins><em>users can't delete</a>,
and</em></ins></span> they <span class="removed"><del><strong>don't
snoop.</p>
- <p>With proprietary apps, one can only hope</strong></del></span>
<span class="inserted"><ins><em>send so much data</em></ins></span> that <span
class="removed"><del><strong>they don't.</p></strong></del></span> <span
class="inserted"><ins><em>their
+ <p>Samsung</em></ins></span> phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>, and they send so much data that their
transmission is a substantial expense for users. Said transmission,
not wanted or requested by the user, clearly must constitute spying
- of some kind.</p></em></ins></span>
- </li>
+ of some
+ <span class="removed"><del><strong>kind.</p></li>
-<span class="removed"><del><strong><li>
- <p>A study found 234</strong></del></span>
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>kind.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201403120">
+ <li id="M201403120">
<p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p>
+ Samsung's back door</a> provides access to any file
on</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>system.</p></em></ins></span>
</li>
- <li id="M201308010">
- <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps that track users</strong></del></span> <span
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
- Journal (in an article blocked from us</em></ins></span> by <span
class="inserted"><ins><em>a paywall) reports that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone</em></ins></span> in
<span class="removed"><del><strong>stores or played</strong></del></span> <span
class="inserted"><ins><em>Android phones
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308010">
+ <p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li id="M201307280">
- <p>Spyware is present in some Android devices when they are
- sold. Some Motorola phones, made when this company was
owned</em></ins></span>
- by <span class="removed"><del><strong>TV programs</a>.
- </p>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command and users cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p>
+ </li>
-</li>
+ <li><p>The nonfree Snapchat app's principal
purpose</strong></del></span>
-<li>
- <p>Pairs</strong></del></span> <span class="inserted"><ins><em>Google,
use a modified version</em></ins></span> of Android <span
class="removed"><del><strong>apps can collude to transmit
users'</strong></del></span> <span class="inserted"><ins><em>that <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends</em></ins></span> personal data to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ <span class="inserted"><ins><em><li id="M201307280">
+ <p>Spyware</em></ins></span> is <span
class="removed"><del><strong>to restrict
+ the</strong></del></span> <span class="inserted"><ins><em>present in
some Android devices when they are
+ sold. Some Motorola phones, made when this company was owned
+ by Google,</em></ins></span> use <span class="inserted"><ins><em>a
modified version</em></ins></span> of <span class="removed"><del><strong>data
on the user's computer, but it does surveillance
+ too:</strong></del></span> <span class="inserted"><ins><em>Android
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data</em></ins></span> to <span
class="removed"><del><strong>get the user's list of other people's phone
+ numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
- <li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em><li id="M201307250">
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data
in</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></em></ins></span>
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201302150"></em></ins></span>
- <p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
+ <span class="inserted"><ins><em><li id="M201302150">
+ <p>Google Play intentionally sends</em></ins></span> app <span
class="removed"><del><strong>will give Verizon</strong></del></span> <span
class="inserted"><ins><em>developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
+ the <span class="removed"><del><strong>same
+ information about the users' searches</strong></del></span> <span
class="inserted"><ins><em>personal details of users</em></ins></span> that
<span class="removed"><del><strong>Google normally gets when
+ they use its search engine.</p>
- <p>Merely asking the “consent” of users is not enough to
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>install</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>not enough to
legitimize actions like this. At this point, most users have stopped
reading the “Terms and Conditions” that spell out what
- they are “consenting” to. Google should clearly and
- honestly identify the information it collects on users, instead of
+ they are “consenting” to. Google should
clearly</em></ins></span> and
+ <span class="inserted"><ins><em>honestly identify</em></ins></span> the
+ <span class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>information it collects on users, instead of
hiding it in an obscurely worded EULA.</p>
- <p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information in the
- first place!</p>
+ <p>However, to truly protect people's privacy, we</em></ins></span>
must <span class="removed"><del><strong>explicitly opt-in before the app takes
effect. However,</strong></del></span> <span class="inserted"><ins><em>prevent
Google
+ and other companies from getting this personal information
in</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
+ still spyware.</p></strong></del></span>
+ <span class="inserted"><ins><em>first place!</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span>
<span class="inserted"><ins><em><li id="M201111170">
- <p>Some manufacturers add a <a
+ <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not
only</strong></del></span> <span class="inserted"><ins><em><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
@@ -824,37 +1014,49 @@
</div>
<ul class="blurbs">
-<!-- INSERT e-readers -->
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
-
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on readers</a>.</p>
+ <p>E-books</em></ins></span> can <span
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
</li>
<li id="M201410080">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of <span
class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>data to Adobe</a>. Adobe's
“excuse”: it's
+ send lots</em></ins></span> of data <span class="inserted"><ins><em>to
Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212031">
- <p>The Electronic Frontier Foundation has examined and
found</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">various
- kinds of surveillance in</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>Swindle</em></ins></span> and <span
class="inserted"><ins><em>other e-readers</a>.</p>
+ <p>The Electronic Frontier Foundation has examined and found <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012">various
+ kinds of surveillance</em></ins></span> in the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>Swindle</em></ins></span> and <span
class="inserted"><ins><em>other e-readers</a>.</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after</strong></del></span> <span
class="inserted"><ins><em>many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at what time</a>.</p>
+ report even which page</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps that include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -870,66 +1072,67 @@
</div>
<ul class="blurbs">
-<!-- INSERT apps -->
<li id="M201808030">
- <p>Some Google apps on Android <a
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>what radio and TV programs</strong></del></span>
<span class="inserted"><ins><em>Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's</em></ins></span> location <span
class="removed"><del><strong>tracking, you must</strong></del></span> <span
class="inserted"><ins><em>even when users</em></ins></span> disable <span
class="removed"><del><strong>Google Play itself</strong></del></span> <span
class="inserted"><ins><em>“location
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
- yet another example</strong></del></span> <span
class="inserted"><ins><em>other kinds</em></ins></span> of <span
class="removed"><del><strong>nonfree software pretending to
obey</strong></del></span> <span class="inserted"><ins><em>location
- tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>user,
- when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also on
what</strong></del></span> <span class="inserted"><ins><em>other ways to turn
off the other kinds of location
+ tracking, but most</em></ins></span> users <span
class="removed"><del><strong>post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>will be tricked by the misleading
control.</p></em></ins></span>
</li>
- <li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201806110">
+ <p>The Spanish football streaming</em></ins></span> app <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="removed"><del><strong>suggests you</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to
save</em></ins></span>
- a <span class="removed"><del><strong>thing would</strong></del></span>
<span class="inserted"><ins><em>recording. But I can't</em></ins></span> be
<span class="removed"><del><strong>almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>sure from the article.</p>
-
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
- </li>
-
- <span
class="removed"><del><strong><li><p>More</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More</em></ins></span> than <span
class="removed"><del><strong>73%</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of the <span class="removed"><del><strong>most
popular</strong></del></span> <span
class="inserted"><ins><em>5,855</em></ins></span> Android apps
- <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>studied by
researchers were found to snoop</em></ins></span>
- and <span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>their users with
third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,” unrelated
to</strong></del></span> the <span class="removed"><del><strong>app's
functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"></strong></del></span>
<span class="inserted"><ins><em>apps were</em></ins></span>
- found <span class="inserted"><ins><em>to insecurely snitch on its users.
Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>the 500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not have described</strong></del></span> these
<span class="inserted"><ins><em>proprietary</em></ins></span> apps <span
class="removed"><del><strong>as
- “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>whose
- source code they cannot look at.</em></ins></span> The <span
class="removed"><del><strong>clear way to say
- “zero price”</strong></del></span> <span
class="inserted"><ins><em>other apps might be snooping
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>picture</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If</em></ins></span> you <span class="removed"><del><strong>take
according</strong></del></span> <span
class="inserted"><ins><em>learn</em></ins></span> to <span
class="removed"><del><strong>who
+ is</strong></del></span> <span class="inserted"><ins><em>care much less
about sports, you will benefit</em></ins></span> in
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
+ </li>
+
+ <li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>5,855 Android apps
studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>snoop
+ and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="inserted"><ins><em>insecurely
snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might</em></ins></span> be
+ <span class="removed"><del><strong>sent across the wire to Facebook's
servers</strong></del></span> <span class="inserted"><ins><em>snooping
in other ways.</p>
- <p>This</em></ins></span> is <span
class="removed"><del><strong>“gratis.”</p>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>freedom, Android users
+ need to get rid</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android by <a
href="https://replicant.us">switching</em></ins></span> to <span
class="inserted"><ins><em>Replicant</a>,
+ and</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
- <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>evidence</em></ins></span> that <span
class="inserted"><ins><em>proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by <a
href="https://replicant.us">switching</em></ins></span> to
- <span class="removed"><del><strong>analyze what</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on</strong></del></span> proprietary <span
class="removed"><del><strong>malware (DRM and snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>apps by
getting apps from the free software
+ only</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
the user if an app contains anti-features</a>.</p>
</li>
@@ -937,377 +1140,323 @@
<li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which</em></ins></span> users are <span class="removed"><del><strong>doing
or how. “Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>HIV-positive, then provides the information to
- companies</a>.</p>
+ which</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some</strong></del></span> are <span
class="removed"><del><strong>starting</strong></del></span> <span
class="inserted"><ins><em>HIV-positive, then provides the
information</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span>
+ <span class="inserted"><ins><em>companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so</em></ins></span> that <span
class="removed"><del><strong>snoop are
- just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>users communicate such info to each</em></ins></span>
- other <span
class="removed"><del><strong>snooping.</p></strong></del></span> <span
class="inserted"><ins><em>but not to the server's database.</p>
+ It could be designed so</em></ins></span> that <span
class="removed"><del><strong>it is nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>users communicate such info to each
+ other but not to</em></ins></span> the <span
class="inserted"><ins><em>server's database.</p>
</li>
<li id="M201803050">
<p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
+ spy on users even more than users expected. It</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where</em></ins></span> they <span class="removed"><del><strong>present
snooping as a way</strong></del></span> <span class="inserted"><ins><em>travel
before and after going</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of the proprietary software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
<p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other</strong></del></span>
<span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software in popular</em></ins></span> Android apps <span
class="removed"><del><strong>(but not</strong></del></span>
- <span class="inserted"><ins><em>is pervasive and sometimes very clever.
Some trackers can</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect to 100</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
+ <p>Tracking software in popular Android</em></ins></span> apps <span
class="removed"><del><strong>the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ is <span class="removed"><del><strong>doing this in</strong></del></span>
<span class="inserted"><ins><em>pervasive and sometimes very clever. Some
trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</em></ins></span> a <span class="removed"><del><strong>way that at
least is visible</strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on the average.</p>
- </li>
- <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>email addresses</a></em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>user's address
- book</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article misuses
the words
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as bad as
what</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span> <span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>zero price.</p></em></ins></span>
+ referring to zero price.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
<span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
+ <p>20 dishonest Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
+ <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>any file</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy;</em></ins></span>
on the <span class="removed"><del><strong>system.</p>
- </li>
-</ul>
+ <p>Google did not intend to make these</em></ins></span> apps <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>spy;</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is</strong></del></span>
<span class="inserted"><ins><em>contrary, it
+ worked</em></ins></span> in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for</em></ins></span> the snooping <span class="removed"><del><strong>done
by</strong></del></span> <span class="inserted"><ins><em>of these
apps.</p>
+ <p>On</em></ins></span> the <span class="removed"><del><strong>phone
company,</strong></del></span> <span class="inserted"><ins><em>other hand,
Google redistributes nonfree Android apps,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares</em></ins></span> in the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>responsibility for</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There</em></ins></span> is no <span
class="removed"><del><strong>excuse for malware.</p>
+ </li>
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>contrary, it
- worked in various ways</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>systematic way</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>Google, or Android
users,</em></ins></span>
+ to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>inspect executable
proprietary apps</em></ins></span> to <span class="inserted"><ins><em>see what
they do.</p>
+
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>app developer but</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it</em></ins></span> did <span
class="removed"><del><strong>not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>a good job of this,</em></ins></span> it <span
class="removed"><del><strong>to other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>could more or less
+ prevent such snooping, except when</em></ins></span> the
+ <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>app developers are clever
+ enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>anyone? A free
software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>the
+ public, so we can depend on each other.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <li><p>Apple proposes</strong></del></span> <span
class="inserted"><ins><em>the responsibility for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google</em></ins></span> have <span
class="inserted"><ins><em>done a better job of preventing apps from
- cheating? There is</em></ins></span> no <span
class="inserted"><ins><em>systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
- to <span class="removed"><del><strong>tell whether the phone is snooping on
- them.</p></li>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span>
to <span class="removed"><del><strong>Apple's servers</a>. Big Brother
can
- get them from there.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
+ on users</a>.</p>
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>see what
they do.</p>
+ <p>With free software apps,</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends personal data
about them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>could <em>make sure</em> that they
+ don't snoop.</p>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>server records these numbers</strong></del></span>
<span class="inserted"><ins><em>source code</em></ins></span> for <span
class="removed"><del><strong>at least 30
- days.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span>
- the <span class="inserted"><ins><em>source</em></ins></span> code <span
class="removed"><del><strong>Apple
- sends</strong></del></span> <span
class="inserted"><ins><em>somehow</em></ins></span> to <span
class="removed"><del><strong>it.</p>
- </li>
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
- various ways. If it did a good job</em></ins></span> of <span
class="inserted"><ins><em>this, it could more or less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ <span class="inserted"><ins><em><li id="M201705040">
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
+ to <span class="removed"><del><strong>spy through it too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p>
</li>
+</ul>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
- enough</em></ins></span> to <span class="removed"><del><strong>Apple's
servers all</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</em></ins></span> to <span class="removed"><del><strong>date on all
your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>ultrasound from beacons placed</em></ins></span> in
<span class="removed"><del><strong>Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup</strong></del></span> <span class="inserted"><ins><em>protect
us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
+<ul>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>stores or
played by TV
+ programs</a>.</p>
+ </li>
- <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by
default</strong></del></span> <span class="inserted"><ins><em>the
- public,</em></ins></span> so <span class="removed"><del><strong>it still
counts as a
- surveillance functionality.</p>
+ <li id="M201704260">
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
- <p>Unknown people apparently took advantage of this
to</strong></del></span> <span class="inserted"><ins><em>we can depend on each
other.</p>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span class="inserted"><ins><em>do
lots of surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>personal data</em></ins></span> in <span
class="removed"><del><strong>on a child's speech, and even speak
+ into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
</li>
- <li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA</strong></del></span>
- <span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
- on users</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
- <p>With free software apps, users could <em>make
sure</em> that they
- don't snoop.</p>
+ <span class="inserted"><ins><em><li id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for</em></ins></span> its <span
class="removed"><del><strong>users through</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>proprietary control
app</a>.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>access any of them through</strong></del></span>
<span class="inserted"><ins><em>only hope that they don't.</p>
- </li>
+ <p>The</strong></del></span> app <span
class="removed"><del><strong>was reporting</strong></del></span> <span
class="inserted"><ins><em>would record</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
- <li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>audio files</em></ins></span> users <span
class="removed"><del><strong>could have
+ checked and changed.</p>
- <li><p>Spyware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets</strong></del></span> stores <span
class="removed"><del><strong>determine exactly where the iThing is,
- and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>or played by TV
- programs</a>.</p></em></ins></span>
- </li>
+ <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>listen to
+ along with</em></ins></span> the <span
class="removed"><del><strong>vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how
+ people used it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial
number.</p></em></ins></span>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
+ <p>The <span class="removed"><del><strong>company's
statement</strong></del></span> <span class="inserted"><ins><em>suit
accuses</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> was <span
class="removed"><del><strong>anonymizing</strong></del></span> <span
class="inserted"><ins><em>done without</em></ins></span> the <span
class="removed"><del><strong>data may be
+ true, but it doesn't really matter.</strong></del></span> <span
class="inserted"><ins><em>users' consent.</em></ins></span>
+ If <span class="removed"><del><strong>it had sold</strong></del></span>
the <span class="removed"><del><strong>data to a
+ data broker,</strong></del></span> <span class="inserted"><ins><em>fine
print of</em></ins></span> the <span class="removed"><del><strong>data broker
would have been able to figure</strong></del></span> <span
class="inserted"><ins><em>app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat</em></ins></span>
out
+ <span class="removed"><del><strong>who the user was.</p>
- <span class="inserted"><ins><em><li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</em></ins></span> it
- <span class="removed"><del><strong>is still true</strong></del></span>
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in
<span class="removed"><del><strong>iOS 7.)</p></strong></del></span>
<span class="inserted"><ins><em>the
device</a>.</p></em></ins></span>
+ <p>Following this lawsuit,</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design</em></ins></span>
+ the <span class="removed"><del><strong>company has been
ordered</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
+ <li id="M201704074">
+ <p>Pairs</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>Android apps can collude</em></ins></span>
+ to <span class="removed"><del><strong>its customers.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for</em></ins></span> its <span
class="removed"><del><strong>geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
- along with the headphone's unique serial number.</p>
-
- <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should</em></ins></span> be
- <span class="removed"><del><strong>turned
off.</p></strong></del></span> <span class="inserted"><ins><em>flat out
<a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs of Android apps can collude
- to transmit users' personal data to servers.</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract</strong></del></span>
+ <li><p> “CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to
<span class="removed"><del><strong>the
+ manufacturer</a>. Guess what?</strong></del></span> <span
class="inserted"><ins><em>servers.</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens of thousands of pairs that collude</a>.</p>
+ study</em></ins></span> found <span class="removed"><del><strong>a way to
access the data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>tens
of thousands of pairs that collude</a>.</p>
</li>
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
- on</em></ins></span> some <span class="removed"><del><strong>data from
iPhones for</strong></del></span> <span class="inserted"><ins><em>of its
phones. The app will give Verizon</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
- </li>
+ on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>manufacturer's snooping.</p>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>same information
- about the users' searches that Google normally gets when they use
+ <p>That</strong></del></span> <span class="inserted"><ins><em>same
information
+ about</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>users' searches that Google normally gets when they
use
its search engine.</p>
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the
<span class="removed"><del><strong>data in an iThing,
- or it is totally incompetent.</a></p>
- </li>
+ <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these conversations
+ was unacceptable by itself.</p></li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>app
- remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>iOS seem to exist for no
- possible purpose other than surveillance</a>.
Here</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> is <span
class="removed"><del><strong>the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>still spyware.</p></em></ins></span>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>,</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the user must
+ explicitly opt-in before the app takes effect. However, the app
+ remains spyware—an “optional” piece of spyware is
+ still spyware.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201701210">
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
- <li><p>According to Edward Snowden,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701210">
- <p>The Meitu photo-editing app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="removed"><del><strong>turn the
phones
- on</strong></del></span> <span class="inserted"><ins><em>a Chinese
company</a>.</p>
+<li><p></strong></del></span> <span class="inserted"><ins><em>a
Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber app tracks <a
-
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</em></ins></span> and <span
class="removed"><del><strong>off, listen to the microphone, retrieve
geo-location data from</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
-
- <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>contact list. This
malware</strong></del></span> <span class="inserted"><ins><em>user's
- consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>designed to
- disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>inadequate as a protection against
- massive surveillance.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160">
- <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a></em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span
class="inserted"><ins><em>investigated the privacy</em></ins></span> and <span
class="removed"><del><strong>they send so much data</strong></del></span> <span
class="inserted"><ins><em>security of
- 283 Android VPN apps concluded</em></ins></span> that <span
class="removed"><del><strong>their transmission is a
- substantial expense</strong></del></span> <span
class="inserted"><ins><em>“in spite of the promises</em></ins></span>
- for <span class="removed"><del><strong>users. Said transmission, not
wanted or
- requested</strong></del></span> <span class="inserted"><ins><em>privacy,
security, and anonymity given</em></ins></span> by the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>majority</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
- </li>
-
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>VPN
+ <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note that</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+
+ <p>This example illustrates how “getting the user's
+ consent” for surveillance is inadequate as a protection against
+ massive surveillance.</p>
+ </li>
+
+ <li id="M201611160">
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
apps—millions of users may be unawarely subject to poor security
- guarantees and abusive practices inflicted</em></ins></span> by <span
class="inserted"><ins><em>VPN apps.”</p>
-
- <p>Following is</em></ins></span> a <span
class="removed"><del><strong>paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the
<span class="removed"><del><strong>GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>research
paper,
- of some proprietary VPN apps that track users</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
+ guarantees and abusive practices inflicted by VPN apps.”</p>
- <li><p>Portable phones with GPS will send</strong></del></span>
<span class="inserted"><ins><em>infringe</em></ins></span> their <span
class="removed"><del><strong>GPS location on
- remote command</strong></del></span>
- <span class="inserted"><ins><em>privacy:</p>
+ <p>Following is a non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
+ privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX</em></ins></span>
and <span class="inserted"><ins><em>Appflood,
- meant to track</em></ins></span> users <span
class="removed"><del><strong>cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says</strong></del></span> <span class="inserted"><ins><em>and
show them targeted ads.</dd>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>has full access to
users'
+ permissions upon installation, meaning it has full access to users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</em></ins></span> to <span class="inserted"><ins><em>read logs
- for other apps and also core system logs. TigerVPN
developers</em></ins></span> have <span
class="removed"><del><strong>GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal purpose
is</strong></del></span>
- <span class="inserted"><ins><em>confirmed this.</dd>
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
+ for other apps and also core system logs. TigerVPN developers have
+ confirmed this.</dd>
<dt>HideMyAss</dt>
<dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> the <span
class="removed"><del><strong>use of data on</strong></del></span> <span
class="inserted"><ins><em>UK government if requested.</dd>
+ may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>user's computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span> <span class="inserted"><ins><em>HTML
pages returned</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="removed"><del><strong>user's list</strong></del></span>
- <span class="inserted"><ins><em>users. The stated
purpose</em></ins></span> of <span class="removed"><del><strong>other people's
phone
- numbers.</a></p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
-
-<ul>
- <li>
- <p>Faceapp appears</strong></del></span> <span
class="inserted"><ins><em>the JS injection is</em></ins></span> to <span
class="removed"><del><strong>do lots of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
- roughly five tracking libraries. Also,</em></ins></span> it <span
class="removed"><del><strong>demands to personal data in</strong></del></span>
<span class="inserted"><ins><em>redirects</em></ins></span> the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
-
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</strong></del></span> <span
class="inserted"><ins><em>user's
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection is to display ads. Uses
+ roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this</em></ins></span> app <span
class="inserted"><ins><em>have confirmed</em></ins></span> that <span
class="removed"><del><strong>it will</a>
- pre-install on some</strong></del></span>
- <span class="inserted"><ins><em>the non-premium
version</em></ins></span> of <span class="removed"><del><strong>its phones.
The</strong></del></span> <span class="inserted"><ins><em>the</em></ins></span>
app <span class="removed"><del><strong>will give Verizon</strong></del></span>
<span class="inserted"><ins><em>does JavaScript injection for
- tracking</em></ins></span> the <span class="removed"><del><strong>same
- information about</strong></del></span> <span
class="inserted"><ins><em>user and displaying ads.</dd>
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
</dl>
</li>
@@ -1321,116 +1470,73 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>picture you take according to who is
+ and suggests you to share the picture you take according to who is
in the frame.</p>
<p>This spyware feature seems to require online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>pictures are likely to be
- sent across the wire to Facebook's servers</em></ins></span> and <span
class="inserted"><ins><em>face-recognition
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if</em></ins></span> the user <span class="removed"><del><strong>must
explicitly opt-in before the app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>didn't “upload” them
to</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
+ even if the user didn't “upload” them to the service.</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu
photo-editing</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605310">
- <p>Facebook's</em></ins></span> app <span
class="inserted"><ins><em>listens all the time,</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>a Chinese company</a>.</p></li>
-
- <li><p>A</strong></del></span> <span
class="inserted"><ins><em>or watching</a>. In addition,
+ <li id="M201605310">
+ <p>Facebook's app listens all the time, <a
+
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening to or watching</a>. In addition,
it may be analyzing people's conversations to serve them with targeted
advertisements.</p>
</li>
<li id="M201604250">
- <p>A</em></ins></span> pregnancy test controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy</em></ins></span> on many sorts of data in the phone, and in server
accounts,
- it can alter them <span class="removed"><del><strong>too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how “getting the user's
consent”
- for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601130">
- <p>Apps</em></ins></span> that include <a
+ <li id="M201601130">
+ <p>Apps that include <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
such as Facebook, Google+ and Twitter.</p>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app
- <a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
+ <li id="M201511190">
<p>“Cryptic communication,”
- unrelated</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> the <span
class="removed"><del><strong>picture you take according to who
- is</strong></del></span> <span class="inserted"><ins><em>app's
functionality, was <a
+ unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</em></ins></span> in the <span
class="removed"><del><strong>frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures</strong></del></span>
<span class="inserted"><ins><em>500 most popular gratis Android
apps</a>.</p>
+ found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they</em></ins></span> are <span
class="removed"><del><strong>likely</strong></del></span> <span
class="inserted"><ins><em>not free software. The clear way</em></ins></span>
- to <span class="removed"><del><strong>be
- sent across</strong></del></span> <span class="inserted"><ins><em>say
“zero price” is “gratis.”</p>
-
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
- legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span>
- <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
+
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other snooping.</p>
</li>
<li id="M201510300">
- <p>More than 73%</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>47%</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if the user didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>mobile
applications, from Android and iOS
+ <p>More than 73% and 47% of mobile applications, from Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
- third parties.</p></em></ins></span>
+ third parties.</p>
</li>
- <span
class="removed"><del><strong><li><p>Like</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201508210">
- <p>Like</em></ins></span> most “music screaming”
disservices, Spotify is
+ <li id="M201508210">
+ <p>Like most “music screaming” disservices, Spotify is
based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some are
starting
to realize that it is nasty.</p>
<p>This article shows the <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></em></ins></span>
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
typical example of the attitude of the proprietary software industry
@@ -1438,40 +1544,30 @@
<p>Out, out, damned Spotify!</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
- <span class="inserted"><ins><em><li id="M201506264">
+ <li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study in 2015</a> found that 90% of the top-ranked
gratis</em></ins></span> proprietary
- <span class="inserted"><ins><em>Android</em></ins></span> apps <span
class="removed"><del><strong>for mobile devices report which other
- apps</strong></del></span> <span class="inserted"><ins><em>contained
recognizable tracking libraries. For</em></ins></span> the <span
class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span> <span class="inserted"><ins><em>paid
+ study in 2015</a> found that 90% of the top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries. For the paid
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them are not</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>fact <a
+ “free”, but most of them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for</em></ins></span>
that <span class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>word</em></ins></span>
- is <span class="removed"><del><strong>visible and
- optional</a>. Not as bad as what the others
do.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
+ ugly word “monetize”. A good replacement for that word
+ is “exploit”; nearly always that will fit perfectly.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505060">
- <p>Gratis Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>(but
not</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
+ <li id="M201505060">
+ <p>Gratis Android apps (but not <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p></em></ins></span>
+ and advertising</a> URLs, on the average.</p>
</li>
- <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504060">
- <p>Widely</em></ins></span> used <a
+ <li id="M201504060">
+ <p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
QR-code scanner apps snoop on the user</a>. This is in addition to
the snooping done by the phone company, and perhaps by the OS in
@@ -1482,9 +1578,7 @@
malware.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201411260">
+ <li id="M201411260">
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
@@ -1507,9 +1601,9 @@
</li>
<li id="M201312060">
- <p>The</em></ins></span> Brightest Flashlight app <a
+ <p>The Brightest Flashlight app <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by <span
class="removed"><del><strong>companies.</a></p></strong></del></span>
<span
class="inserted"><ins><em>companies</a>.</p></em></ins></span>
+ sends user data, including geolocation, for use by
companies</a>.</p>
<p>The FTC criticized this app because it asked the user to
approve sending personal data to the app developer but did not ask
@@ -1519,21 +1613,20 @@
anyone? A free software flashlight app would not.</p>
</li>
- <span class="inserted"><ins><em><li id="M201212100">
+ <li id="M201212100">
<p>FTC says most mobile apps for children don't respect privacy:
<a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li></em></ins></span>
+ </li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4>
+ <h4 id="SpywareInSkype">Skype</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
<ul class="blurbs">
-<!-- INSERT skype -->
<li id="M201307110">
<p>Skype contains <a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
@@ -1545,21 +1638,16 @@
<div class="big-subsection">
- <h4 id="SpywareInGames">Games</h4></em></ins></span>
+ <h4 id="SpywareInGames">Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>nVidia's</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT games -->
+<ul class="blurbs">
<li id="M201806240">
<p>Red Shell is a spyware that
- is found in many</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience</strong></del></span> <span
class="inserted"><ins><em>games. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers</em></ins></span> and <span
class="removed"><del><strong>then</strong></del></span> sends <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>it to third parties</a>.</p>
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
<li id="M201804144">
@@ -1589,26 +1677,23 @@
<li id="M201509160">
<p>Modern gratis game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</em></ins></span> data about <span
class="removed"><del><strong>them</strong></del></span> <span
class="inserted"><ins><em>their users and their users'
+ collect a wide range of data about their users and their users'
friends and associates</a>.</p>
<p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>manipulate people to buy things, and hunt for
+ <p>They use this data to manipulate people to buy things, and hunt
for
“whales” who can be led to spend a lot of money. They also
use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
- can use the same tactics.</p></em></ins></span>
+ can use the same tactics.</p>
</li>
- <span
class="removed"><del><strong><li><p>Angry</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401280">
- <p>Angry</em></ins></span> Birds <a
+ <li id="M201401280">
+ <p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and the NSA takes advantage
to spy through it too</a>. Here's information on <a
@@ -1620,56 +1705,33 @@
More about NSA app spying</a>.</p>
</li>
- <span class="inserted"><ins><em><li id="M200510200">
+ <li id="M200510200">
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
- </li></em></ins></span>
+ </li>
</ul>
-<div <span class="removed"><del><strong>class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-section">
- <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>Toys</h4></strong></del></span> <span
class="inserted"><ins><em>Connected Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInToys">#SpywareInToys</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+<div class="big-section">
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
-
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
-<span class="inserted"><ins><em><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul class="blurbs">
-<!-- INSERT stings -->
- <li id="M201708280"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major</strong></del></span> <span
class="inserted"><ins><em>bad</em></ins></span> security <span
class="removed"><del><strong>vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen</strong></del></span> in <span
class="removed"><del><strong>on a child's speech, and even speak
- into the toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop</em></ins></span> on <span class="removed"><del><strong>its users
through the proprietary control app</a>.</p>
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
- <p>The app was reporting the temperature of</strong></del></span>
the <span class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>people that use
them</a>.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
- <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
-
- <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>article uses
the term <a
+ <p>It is unfortunate that the article uses the term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
@@ -1680,107 +1742,54 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made</em></ins></span> a <span
class="removed"><del><strong>labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked</strong></del></span> <span class="inserted"><ins><em>joke: The
other day a woman came up to me</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
-
- <p>The company that made</strong></del></span>
-<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</em></ins></span> the <span
class="removed"><del><strong>vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>other way.” Evidently</em></ins></span> that
<span class="removed"><del><strong>it</strong></del></span> was <span
class="removed"><del><strong>anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</strong></del></span>
-<span class="inserted"><ins><em>before Amazon “smart”
TVs.</p>
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
<ul class="blurbs">
-<!-- INSERT tvsets -->
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
-
- <p>We link</em></ins></span> to <span class="removed"><del><strong>a
- data broker,</strong></del></span> the <span
class="removed"><del><strong>data broker would have been able to figure out
- who</strong></del></span> <span class="inserted"><ins><em>article
for</em></ins></span> the <span class="removed"><del><strong>user was.</p>
+ load downgrades that</em></ins></span> install <span
class="inserted"><ins><em>a surveillance app</a>.</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>facts it presents. It
- is too bad that</em></ins></span> the <span
class="removed"><del><strong>company has been ordered to pay a
total</strong></del></span> <span class="inserted"><ins><em>article finishes by
advocating the
- moral weakness</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>surrendering</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
<span class="inserted"><ins><em>Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ <p>We link to the article for the facts it presents.
It</em></ins></span>
+ is <span class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>too bad that
the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702060">
- <p>Vizio “smart”</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ <li id="M201702060">
+ <p>Vizio “smart” <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span class="inserted"><ins><em>image is coming
from the user's own computer,
- the TV reports what it is. The existence of</em></ins></span> a way to
<span class="removed"><del><strong>access the data</a>
- collected by</strong></del></span> <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was in these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>surveillance.</p>
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
</li>
<li id="M201511130">
- <p>Some web</em></ins></span> and <span
class="removed"><del><strong>the FBI could listen</strong></del></span> <span
class="inserted"><ins><em>TV advertisements play inaudible
- sounds</em></ins></span> to <span class="removed"><del><strong>these
conversations
- was unacceptable</strong></del></span> <span
class="inserted"><ins><em>be picked up</em></ins></span> by <span
class="removed"><del><strong>itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
- </li>
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
</ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>proprietary malware running</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>other devices</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>range so as to
determine</em></ins></span> that <span class="removed"><del><strong>the
specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>they
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>range so as</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and
other</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ your TV, advertisers can correlate ads with Web activity, and other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
<li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers</em></ins></span> in <span class="removed"><del><strong>its
own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>spying</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ manufacturers in spying</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1861,9 +1870,9 @@
<span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are</em></ins></span> watching</a>, even <span
class="removed"><del><strong>when the “owner” switches it
“off.”</p>
<p>A “smart” device means the manufacturer is
using</strong></del></span> <span
class="inserted"><ins><em>if</em></ins></span> it <span
class="removed"><del><strong>to outsmart
- you.</p>
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>isn't a TV channel.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
<h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
@@ -1872,10 +1881,9 @@
<ul>
<li><p>E-books can contain Javascript code,
- and</strong></del></span> <span class="inserted"><ins><em>isn't a TV
channel.</p>
- </li>
+ and</strong></del></span>
- <li id="M201505290">
+ <span class="inserted"><ins><em><li id="M201505290">
<p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
this code</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"></em></ins></span>
@@ -1917,79 +1925,80 @@
<p>That's easy</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
- users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>first sold.</p>
+ users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no authentication when
+ accessed through the modem. However, even if it asked for
+ authentication, you couldn't be confident</strong></del></span> that <span
class="removed"><del><strong>Nissan has no
+ access. The software in the car is
+ proprietary,</strong></del></span> <span class="inserted"><ins><em>when
first sold.</p>
</li>
<li id="M201502090">
- <p>The Samsung “Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in the car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span class="inserted"><ins><em>and would then
have to give</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
+ <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
- <p>Even if no one connects</strong></del></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>US or some
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>and would then have</em></ins></span> to <span
class="removed"><del><strong>the car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time;</strong></del></span> <span class="inserted"><ins><em>be trusted
unless</em></ins></span> it is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>done by free
- software in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span class="inserted"><ins><em>third
+ <p>Speech recognition is not to be trusted unless</em></ins></span>
it is <span class="removed"><del><strong>possible to physically remove the cell
phone modem
+ though.</p>
+ </li>
+
+ <li id="records-drivers"><p>Proprietary</strong></del></span>
<span class="inserted"><ins><em>done by free</em></ins></span>
+ software in <span class="removed"><del><strong>cars</strong></del></span>
<span class="inserted"><ins><em>your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive</em></ins></span> information <span
class="removed"><del><strong>about drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>will be transmitted</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p></strong></del></span> <span
class="inserted"><ins><em>third
parties</a>.</p>
</li>
- <li id="M201411090">
- <p>The Amazon “Smart” TV is <a
+ <li id="M201411090"></em></ins></span>
+ <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article,</strong></del></span> <span
class="inserted"><ins><em>Amazon “Smart” TV</em></ins></span> is
<span class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span class="removed"><del><strong>cell
phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
+ snooping all the time</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ <li id="M201409290">
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
- <p>The <span class="removed"><del><strong>case</strong></del></span>
<span class="inserted"><ins><em>report was as</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned
in</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect</em></ins></span> this <span class="removed"><del><strong>article, is not
- really a matter of proprietary surveillance. These
systems</strong></del></span> <span class="inserted"><ins><em>has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
+ payment systems,</strong></del></span> <span
class="inserted"><ins><em>2014,</em></ins></span> but <span
class="removed"><del><strong>the invasion isn't done by malware. The other
+ cases mentioned</strong></del></span> <span class="inserted"><ins><em>we
don't expect this has got
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned</strong></del></span> <span class="inserted"><ins><em>TV
will
- say, “Without your consent to tracking, the TV will not
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>not allowed to report what the
- user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the <span class="removed"><del><strong>car's location at
any time. (See</strong></del></span>
+ <span class="inserted"><ins><em>user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>LG
“smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>user watches, and</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>turn
this off has
- no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em>transmission reports
a 404 error
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store</strong></del></span> <span class="inserted"><ins><em>the switch
to turn</em></ins></span> this <span class="removed"><del><strong>information,
but if</strong></del></span> <span class="inserted"><ins><em>off has
+ no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
@@ -2027,7 +2036,6 @@
lot</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT cameras -->
<li id="M201603220">
<p>Over 70 brands</em></ins></span> of <span
class="removed"><del><strong>data about the
user</a>.</p></strong></del></span> <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
@@ -2056,7 +2064,6 @@
<span class="removed"><del><strong><p>Emo Phillips
made</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT toys -->
<li id="M201711244">
<p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
@@ -2122,35 +2129,33 @@
user <span class="removed"><del><strong>watches — no
exceptions!</p>
</li>
<li><p>Vizio goes a step further than other TV manufacturers in
spying on
- their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn</strong></del></span> <span
class="inserted"><ins><em>was.</p>
-
- <p>Following</em></ins></span> this <span
class="removed"><del><strong>off, but having it enabled by default
- is an injustice already.</p>
+ <p>It is possible</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having it enabled by default
+ is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a> to its
+ customers.</p></em></ins></span>
</li>
- <li><p>Tivo's alliance with Viacom adds 2.3 million households to
- the 600 millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the company <span class="removed"><del><strong>already
+ <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>microphones
<a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media profiles the company
already
monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>has been ordered to pay a total of
C$4m</a> to its
- customers.</p>
- </li>
-
- <li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to
- <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a>
collected</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way</em></ins></span> to
+ <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>access the
data</a> collected</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
<li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the
manufacturer's snooping.</p>
@@ -2168,24 +2173,27 @@
<p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="inserted"><ins><em>i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p></strong></del></span>
<span class="inserted"><ins><em>speech recognition
+ conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV
+ <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span> <span class="inserted"><ins><em>speech
recognition
company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p></em></ins></span>
+ crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p></em></ins></span>
+ going</em></ins></span> to <span class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>would then have</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2194,12 +2202,11 @@
</div>
<ul class="blurbs">
-<!-- INSERT drones -->
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>the internet</strong></del></span>
<span class="inserted"><ins><em>you</a>.</p>
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
</ul>
@@ -2209,12 +2216,10 @@
</div>
<ul class="blurbs">
-<!-- INSERT home -->
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
- and <span class="removed"><del><strong>would then have to
- give</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way</em></ins></span> to
+ <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
<p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
@@ -2253,7 +2258,7 @@
a device</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
<p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>can obey your voice commands without potentially
spying
- on you. Even if it is air-gapped,</em></ins></span> it <span
class="inserted"><ins><em>could be saving up records
+ on you. Even if</em></ins></span> it <span class="inserted"><ins><em>is
air-gapped, it could be saving up records
about you for later examination.</p>
</li>
@@ -2278,7 +2283,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT wearables -->
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
@@ -2295,7 +2299,6 @@
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
-<!-- INSERT watches -->
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
@@ -2332,7 +2335,6 @@
<li><p>Users</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT cars -->
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -2363,25 +2365,25 @@
If</strong></del></span> <span class="inserted"><ins><em>do
because</em></ins></span> the <span class="removed"><del><strong>fine print
of</strong></del></span> <span class="inserted"><ins><em>system has no
authentication
when accessed through</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
would that make</strong></del></span> <span class="inserted"><ins><em>modem.
However, even if</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It
should</strong></del></span> <span class="inserted"><ins><em>asked
- for authentication, you couldn't</em></ins></span> be <span
class="removed"><del><strong>flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal to design</strong></del></span> <span
class="inserted"><ins><em>confident that Nissan
- has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
-</p>
-</li>
-
- <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report</strong></del></span>
+ for authentication, you couldn't</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>confident that Nissan
+ has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to the
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
+</p>
+</li>
+
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the
cell phone modem
+ enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track the car's movements all</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
- enables the phone company to track the car's movements all the time;
- it is possible to physically remove the cell phone modem,
though.</p></em></ins></span>
+ <p>A game console</strong></del></span> <span
class="inserted"><ins><em>time;
+ it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
@@ -2428,7 +2430,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT virtual -->
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
creates the potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
@@ -2466,7 +2467,6 @@
<li><p>When</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT websites -->
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
@@ -2555,136 +2555,125 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>Google Chrome contains a key logger
that</strong></del></span>
+ <li><p>Google Chrome contains a key logger that
+ <a
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends Google every URL typed in</a>, one key at a time.</p>
+ </li>
+
+ <li><p>Google Chrome includes a module that</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT javascript -->
<li id="M201807190">
- <p>British Airways used</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL</strong></del></span>
+ <p>British Airways used</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones and transmits audio</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal data on
- its customers</a>.</p>
+ JavaScript on its web site</em></ins></span> to <span
class="inserted"><ins><em>give other companies personal data
on</em></ins></span>
+ its <span
class="removed"><del><strong>servers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>customers</a>.</p></em></ins></span>
</li>
- <li id="M201712300">
- <p>Some JavaScript malware <a
-
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ <span class="removed"><del><strong><li><p>Google Chrome makes it
easy for an extension to do</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201712300">
+ <p>Some JavaScript malware</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
swipes usernames from browser-based password managers</a>.</p>
</li>
<li id="M201712210">
<p>Many web sites use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have</em></ins></span> typed <span
class="removed"><del><strong>in</a>, one key at</strong></del></span>
<span class="inserted"><ins><em>into</em></ins></span> a <span
class="removed"><del><strong>time.</p></strong></del></span>
- <span class="inserted"><ins><em>form but not sent</a>, in order to
learn their identity. Some are <a
+ to snoop</em></ins></span> on <span class="inserted"><ins><em>information
that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are
<a
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p></em></ins></span>
+ getting sued</a> for this.</p>
</li>
- <span class="removed"><del><strong><li><p>Google Chrome includes
a module that</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711150">
+ <li id="M201711150">
<p>Some websites send
- JavaScript code to collect all the user's input,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
+ JavaScript code to collect all</em></ins></span> the user's <span
class="removed"><del><strong>browsing</a>, and many of them do
so.</p></strong></del></span> <span class="inserted"><ins><em>input, <a
+
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
+ code.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInFlash">Flash</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInFlash">Spyware in
Flash</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInFlash">Flash</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
</div>
-<ul class="blurbs">
-<!-- INSERT flash -->
+<span class="removed"><del><strong><ul>
+ <li><p>Flash</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201310110">
- <p>Flash</em></ins></span> and <span
class="removed"><del><strong>transmits audio</strong></del></span> <span
class="inserted"><ins><em>JavaScript are used for <a
+ <p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>its
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>identify users.</p>
+ “fingerprinting” devices</a> to identify users.</p>
</li>
<li id="M201003010">
- <p>Flash Player's <a
+ <p>Flash</em></ins></span> Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track
visitors</a>.</p></em></ins></span>
+ cookie feature helps web sites track visitors</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Google</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <span class="removed"><del><strong><li><p>Flash is also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices </a> to identify
users.</p>
+ </li></strong></del></span>
+</ul>
+<span class="removed"><del><strong><p><a
href="/philosophy/javascript-trap.html">Javascript code</a>
+is another method of “fingerprinting” devices.</p>
-<div class="big-subsection">
- <h4 id="SpywareInChrome">Chrome</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
-</div>
-<ul class="blurbs">
-<!-- INSERT chrome -->
- <li id="M201507280">
- <p>Google</em></ins></span> Chrome makes it easy for an extension to
do <a
-
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on the user's browsing</a>, and many of them do
so.</p>
- </li>
-<span class="removed"><del><strong></ul>
+<!-- #SpywareEverywhere --></strong></del></span>
-<div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware in Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareEverywhere">Spyware
Everywhere</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInChrome">Chrome</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareEverywhere">#SpywareEverywhere</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInChrome">#SpywareInChrome</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
<ul>
- <li><p>Flash Player's
- <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
+ <li><p>The natural</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201507280">
+ <p>Google Chrome makes it easy for an</em></ins></span> extension
<span class="removed"><del><strong>of monitoring people through
+ “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</strong></del></span> to <span
class="removed"><del><strong>make sure they can't
“fool”</strong></del></span> <span class="inserted"><ins><em>do
<a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping on</em></ins></span> the
+ <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user's browsing</a>, and many of them do
so.</p></em></ins></span>
</li>
- <li><p>Flash is also used for</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able</strong></del></span>
<span class="inserted"><ins><em><li id="M201506180">
- <p>Google Chrome includes a module that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>identify users.</p></strong></del></span>
<span class="inserted"><ins><em>its
servers</a>.</p></em></ins></span>
+ <p>Google Chrome includes a module that <a
+
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>listen for speech all the time, even when
“off.”</a></p></strong></del></span> <span
class="inserted"><ins><em>its servers</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<p><a href="/philosophy/javascript-trap.html">Javascript
code</a>
-is another method of “fingerprinting” devices.</p>
-
-
-<!-- #SpywareEverywhere -->
-<div class="big-section">
- <h3 id="SpywareEverywhere">Spyware Everywhere</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>The natural extension of monitoring people through
- “their” phones is</strong></del></span>
- <span class="inserted"><ins><em><li id="M201308040">
- <p>Google Chrome</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool” the
- monitoring</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ <li id="M201308040">
+ <p>Google Chrome <a
+ href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
spies on browser history, affiliations</a>, and other installed
- software.</p></em></ins></span>
+ software.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able to listen for speech all the time, even when
“off.”</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200809060">
+ <li id="M200809060">
<p>Google Chrome contains a key logger that <a
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends Google every URL typed in</a>, one key at a
time.</p></em></ins></span>
@@ -2708,7 +2697,6 @@
real</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT networks -->
<li id="M201606030">
<p>Investigation Shows</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
@@ -2792,7 +2780,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/07 22:29:14 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- po/proprietary-surveillance.ja-diff.html 7 Oct 2018 22:29:14 -0000
1.86
+++ po/proprietary-surveillance.ja-diff.html 17 Oct 2018 10:01:36 -0000
1.87
@@ -219,7 +219,6 @@
<li><p>By</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT windows -->
<li id="M201712110">
<p>HP's proprietary operating system <a
href="http://www.bbc.com/news/technology-42309371">includes a
@@ -309,7 +308,8 @@
<p>To use proprietary software is to invite such treatment.</p>
</li>
- <span class="removed"><del><strong><li><p></strong></del></span>
+ <span class="removed"><del><strong><li><p>
+ Windows 10</strong></del></span>
<span class="inserted"><ins><em><li id="M201508180">
<p><a
@@ -320,8 +320,8 @@
<li id="M201508130">
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
- Windows 10 <span class="inserted"><ins><em>sends identifiable information
to Microsoft</a>, even if
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+ Windows 10 sends identifiable information to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
the privacy-protection settings.</p>
</li>
@@ -421,7 +421,6 @@
edited</a>. The</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT macos -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
@@ -501,7 +500,6 @@
behavioral</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT bios -->
<li id="M201509220">
<p><a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
@@ -570,7 +568,6 @@
lots</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT phones -->
<li id="M201601110">
<p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>monitoring
people through “their” phones is <a
@@ -626,7 +623,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT ithings -->
<li id="M201711250">
<p>The DMCA and the EU Copyright Directive</em></ins></span> make
<span class="removed"><del><strong>an Apple ID</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
@@ -697,64 +693,61 @@
<span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites to track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it
- is still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
- turned off.</p>
- </li>
-
- <li><p>Apple can, and regularly does,</strong></del></span>
+ <span class="removed"><del><strong><li><p>There is also a
feature</strong></del></span>
<span class="inserted"><ins><em><li id="M201409220">
- <p>Apple can, and regularly does,</em></ins></span> <a
+ <p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
- <span class="removed"><del><strong></li>
+ remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>web sites to track users, which
is</strong></del></span> <span class="inserted"><ins><em>the
state</a>.</p>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either</strong></del></span>
+ <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks
about</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"></em></ins></span>
+ iOS <span class="removed"><del><strong>6,</strong></del></span> <span
class="inserted"><ins><em>8 security improvements</a>;</em></ins></span>
but <span class="removed"><del><strong>it
+ is still true in iOS 7.)</p>
+ </li>
- <span class="inserted"><ins><em><p>This may have improved with <a
-
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as</em></ins></span> Apple <span
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
- or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>claims</a>.</p></em></ins></span>
+ <li><p>The iThing also</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as</em></ins></span> Apple <span
class="removed"><del><strong>its geolocation</a> by default, though that
can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>claims</a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p><a</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
<span class="inserted"><ins><em><li id="M201407230">
- <p><a</em></ins></span>
+ <p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
+ Several “features” of iOS seem to exist</em></ins></span>
+ for <span class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here is</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
- <span class="inserted"><ins><em><li id="M201401100">
+ <li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
iBeacon</a> lets stores determine exactly where the iThing is, and
- get other info too.</p>
+ get other info too.</p></em></ins></span>
</li>
- <li id="M201312300">
- <p><a
+ <span
class="removed"><del><strong><li><p><a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312300">
+ <p><a</em></ins></span>
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
Either Apple helps the NSA snoop on all the data in an iThing, or it
- is totally incompetent</a>.</p>
+ is totally <span
class="removed"><del><strong>incompetent.</a></p></strong></del></span>
<span
class="inserted"><ins><em>incompetent</a>.</p></em></ins></span>
</li>
- <li id="M201308080">
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
@@ -762,8 +755,10 @@
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track users, which is
<a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <p>There is also a feature</em></ins></span> for <span
class="removed"><del><strong>no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>web sites to track
users, which</em></ins></span> is <span
class="removed"><del><strong>the</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
still true in iOS 7.)</p>
</li>
@@ -773,8 +768,8 @@
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
to install even gratis apps</a>) without giving a valid
email address and receiving the verification code Apple sends
- to it.</p>
- </li></em></ins></span>
+ to it.</p></em></ins></span>
+ </li>
</ul>
@@ -787,7 +782,6 @@
<li><p>According to Edward Snowden,</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT android -->
<li id="M201711210">
<p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
by</strong></del></span>
@@ -909,7 +903,6 @@
movements before</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT e-readers -->
<li id="M201603080">
<p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>after the ride</a>.</p>
@@ -963,7 +956,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT apps -->
<li id="M201808030">
<p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>various sites
such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>Android <a
@@ -1068,11 +1060,10 @@
<span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
<span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass</em></ins></span> app
- <span class="removed"><del><strong><a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</strong></del></span>
<span class="inserted"><ins><em>and dis-service
- spy on users even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ <p>The moviepass</em></ins></span> app <span
class="inserted"><ins><em>and dis-service
+ spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
@@ -1158,7 +1149,8 @@
<ul>
- <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>developers are clever
+ <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued</strong></del></span> <span
class="inserted"><ins><em>developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -1167,20 +1159,19 @@
</li>
<li id="M201705230">
- <p>Apps for BART <a
+ <p>Apps</em></ins></span> for <span
class="removed"><del><strong>collecting</strong></del></span> <span
class="inserted"><ins><em>BART <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>makes
internet-controlled vibrators</strong></del></span> <span
class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
@@ -1379,9 +1370,19 @@
283 Android VPN apps concluded that “in spite of</em></ins></span>
the <span class="removed"><del><strong>e-reader used</strong></del></span>
<span class="inserted"><ins><em>promises
for privacy, security, and anonymity given</em></ins></span> by <span
class="removed"><del><strong>most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span> <span class="inserted"><ins><em>the
majority</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>VPN
- apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>check DRM!</p>
+ send lots</strong></del></span> <span class="inserted"><ins><em>the
majority</em></ins></span> of <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>VPN
+ apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>Adobe</a>. Adobe's
“excuse”: it's
+ needed</strong></del></span> <span class="inserted"><ins><em>poor
security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
+
+ <p>Following is a non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
+ privacy:</p>
+
+ <dl class="compact">
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
</li>
</ul>
@@ -1396,83 +1397,71 @@
snooping devices</a>.</p>
</li>
- <li><p>The Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>poor security
- guarantees and abusive practices inflicted by VPN apps.”</p>
+ <li><p>The Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
- <p>Following is</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ <dt>sFly Network Booster</dt>
+ <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it</em></ins></span> has <span
class="removed"><del><strong>a built-in cell phone modem which allows
effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
<span class="inserted"><ins><em>full</em></ins></span> access <span
class="removed"><del><strong>its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>infringe their
- privacy:</p>
-
- <dl class="compact">
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>do because
the system has no authentication when
- accessed through the modem. However, even if</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that
Nissan</strong></del></span> has <span class="removed"><del><strong>no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>full access to users'
+ <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
- for other apps and also core system logs. TigerVPN developers have
+ <dd>Requests</em></ins></span> the <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
+ for other apps and also core</em></ins></span> system <span
class="removed"><del><strong>has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>stores detailed logs and
- may turn them over</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>UK
government if requested.</dd>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ may turn them over to</em></ins></span> the <span
class="removed"><del><strong>modem. However, even</strong></del></span> <span
class="inserted"><ins><em>UK government</em></ins></span> if <span
class="removed"><del><strong>it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access.</strong></del></span> <span
class="inserted"><ins><em>requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>HTML pages returned</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span>
- <span class="inserted"><ins><em>users. The stated purpose
of</em></ins></span> the <span class="removed"><del><strong>time;
it</strong></del></span> <span class="inserted"><ins><em>JS
injection</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
- roughly five tracking libraries. Also, it redirects</em></ins></span>
the <span class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users.</em></ins></span> The <span class="removed"><del><strong>software
in</strong></del></span> <span class="inserted"><ins><em>stated purpose
of</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span> <span
class="inserted"><ins><em>JS injection</em></ins></span> is
+ <span class="removed"><del><strong>proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
- <li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>user's
+ <p>Even if no one connects</strong></del></span> to <span
class="inserted"><ins><em>display ads. Uses
+ roughly five tracking libraries. Also, it redirects</em></ins></span>
the <span class="removed"><del><strong>car remotely,</strong></del></span>
<span class="inserted"><ins><em>user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>also uses roughly
- five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned
in</strong></del></span> this <span class="removed"><del><strong>article, is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>app have confirmed that
- the non-premium version</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>the app does JavaScript injection for
- tracking the user</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
+ the <span class="removed"><del><strong>cell phone
+ modem enables</strong></del></span> <span
class="inserted"><ins><em>non-premium version of</em></ins></span> the <span
class="removed"><del><strong>phone company to track</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection for
+ tracking</em></ins></span> the <span class="removed"><del><strong>car's
movements</strong></del></span> <span class="inserted"><ins><em>user and
displaying ads.</dd>
</dl>
</li>
<li id="M201609210">
<p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</em></ins></span>
+ all
+ <span class="removed"><del><strong>the time; it is possible to physically
remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>conversations</a>.</p></em></ins></span>
</li>
- <li id="M201606050">
- <p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606050">
+ <p>Facebook's new Magic Photo app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available to car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
+ and <span class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>suggests you to share</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>picture you take according to who
is</em></ins></span>
in the <span class="removed"><del><strong>car.</p></li>
@@ -1488,22 +1477,8 @@
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even</em></ins></span> if the <span class="removed"><del><strong>state
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="inserted"><ins><em>service.</p>
- </li>
-
- <li id="M201605310">
- <p>Facebook's app listens all the time, <a
-
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
- advertisements.</p>
- </li>
-
- <li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of</em></ins></span> data <span
class="inserted"><ins><em>in the phone,</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>in server accounts,</em></ins></span>
- it <span class="removed"><del><strong>over, the
state</strong></del></span> can <span class="removed"><del><strong>store
it.</p></strong></del></span> <span class="inserted"><ins><em>alter them
too</a>.</p></em></ins></span>
+ even</em></ins></span> if the <span class="removed"><del><strong>state
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them</em></ins></span> to <span
class="removed"><del><strong>get the data
+ and hand it over,</strong></del></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1511,10 +1486,10 @@
<!-- #SpywareAtHome -->
<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span class="inserted"><ins><em><li id="M201601130">
- <p>Apps that include <a
-
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ <span class="inserted"><ins><em><li id="M201605310">
+ <p>Facebook's app listens all the time, <a
+
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
<div class="big-section">
<h3 id="SpywareAtHome">Spyware at Home</h3>
@@ -1524,82 +1499,107 @@
<ul>
<li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</strong></del></span> <span
class="inserted"><ins><em>what radio and TV programs
- are playing nearby</a>. Also</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>what users post on various sites
- such as Facebook, Google+ and Twitter.</p></em></ins></span>
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>what people are listening to or watching</a>.
In addition,
+ it may be analyzing people's conversations</em></ins></span> to <span
class="inserted"><ins><em>serve them with targeted
+ advertisements.</p>
</li>
-<span class="removed"><del><strong></ul>
+
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"></em></ins></span>
+ spy on <span class="removed"><del><strong>their
renters</a>.</p>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>many sorts of data</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came
up</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
- <p>“Cryptic communication,”
- unrelated</em></ins></span> to <span class="removed"><del><strong>me and
+<p>Emo Phillips made a joke: The other day a woman came up to me and
said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently
that</strong></del></span> <span class="inserted"><ins><em>app's
functionality,</em></ins></span> was
-<span class="removed"><del><strong>before Amazon “smart”
TVs.</p>
+don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>phone, and in server accounts,
+ it can alter them too</a>.</p>
+ </li>
+
+ <li id="M201601130">
+ <p>Apps</em></ins></span> that <span class="removed"><del><strong>was
+before Amazon “smart” TVs.</p>
<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <a <span class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android
apps</a>.</p></em></ins></span>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span
class="inserted"><ins><em>include</em></ins></span> <a <span
class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</em></ins></span> on <span
class="removed"><del><strong>their users</a>.</p>
- <p>The <span class="removed"><del><strong>report
was</strong></del></span> <span class="inserted"><ins><em>article should not
have described these apps</em></ins></span> as <span
class="removed"><del><strong>of 2014, but we don't expect this has got
better.</p>
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</strong></del></span>
- <span
class="inserted"><ins><em>“free”—they</em></ins></span> are
<span class="removed"><del><strong>totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV
will</strong></del></span> not <span
class="removed"><del><strong>work.”</p>
-
- <p>Proper laws would</strong></del></span> <span
class="inserted"><ins><em>free software. The clear way
- to</em></ins></span> say <span class="inserted"><ins><em>“zero
price” is “gratis.”</p>
-
- <p>The article takes for granted</em></ins></span> that <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>the usual analytics tools</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span>
- <span class="inserted"><ins><em>legitimate, but is that valid? Software
developers have no right</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span>
- <span class="inserted"><ins><em>analyze</em></ins></span> what
- <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>users are doing or how. “Analytics” tools
+ consent before collecting personal data are totally inadequate.
+ And</strong></del></span> what <span
class="removed"><del><strong>happens if a user declines consent? Probably
the</strong></del></span> <span class="inserted"><ins><em>radio
and</em></ins></span> TV
+ <span class="removed"><del><strong>will say, “Without your
consent</strong></del></span> <span class="inserted"><ins><em>programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
+ </li>
+
+ <li id="M201511190">
+ <p>“Cryptic communication,”
+ unrelated</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should</em></ins></span> not <span
class="removed"><del><strong>work.”</p>
+
+ <p>Proper laws would say that TVs</strong></del></span> <span
class="inserted"><ins><em>have described these apps as
+ “free”—they</em></ins></span> are not <span
class="removed"><del><strong>allowed</strong></del></span> <span
class="inserted"><ins><em>free software. The clear way</em></ins></span>
+ to <span class="removed"><del><strong>report what</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
+
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>user watches —</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools are
+ legitimate, but is that valid? Software developers have</em></ins></span>
no <span
class="removed"><del><strong>exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>right to
+ analyze what users are doing or how. “Analytics” tools
that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Vizio goes a step
further</strong></del></span>
<span class="inserted"><ins><em><li id="M201510300">
<p>More</em></ins></span> than <span
class="removed"><del><strong>other TV manufacturers in spying on
- their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>73%</em></ins></span> and
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>73% and 47% of mobile applications, from Android and
iOS
+ respectively</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
+ personal, behavioral</em></ins></span> and
<span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
across devices.</p>
- <p>It</strong></del></span> <span class="inserted"><ins><em>47% of
mobile applications, from Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">share
- personal, behavioral and location information</a> of their users with
+ <p>It</strong></del></span> <span
class="inserted"><ins><em>location information</a> of their users with
third parties.</p>
</li>
<li id="M201508210">
- <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span>
- <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>increased snooping</a>, and some are
starting
- to realize that</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice already.</p>
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>possible to
turn this off, but having</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>enabled by default
+ is an injustice already.</p>
</li>
- <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
+ <li><p>Tivo's alliance with Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing
all</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded</em></ins></span> users <span
class="inserted"><ins><em>submit</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>increased snooping</a>,</em></ins></span> and
<span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>some are
starting</em></ins></span>
+ to <span class="removed"><del><strong>be
+ picked up by proprietary malware running on other devices in
+ range so</strong></del></span> <span class="inserted"><ins><em>realize
that it is nasty.</p>
<p>This article shows the <a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</em></ins></span> to
<span class="inserted"><ins><em>“serve”
- users better</a>—never mind whether they want that. This is a
- typical example of</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>attitude
of</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>proprietary software industry
+ twisted ways that they present snooping</em></ins></span> as <span
class="inserted"><ins><em>a way</em></ins></span> to <span
class="removed"><del><strong>determine that</strong></del></span> <span
class="inserted"><ins><em>“serve”
+ users better</a>—never mind whether</em></ins></span> they
<span class="inserted"><ins><em>want that. This is a
+ typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -1613,31 +1613,28 @@
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>not in fact</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>not in
fact</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
<span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>. It also uses the
ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ is “exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize</strong></del></span>
- <li id="M201505060">
+ <span class="inserted"><ins><em><li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>100 <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>TV advertisements play inaudible
sounds to be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs,</em></ins></span> on
<span class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>the average.</p>
+ and <span class="inserted"><ins><em>advertising</a> URLs, on the
average.</p>
</li>
<li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This
is</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>addition</em></ins></span> to <span
class="removed"><del><strong>determine that they</strong></del></span>
- <span class="inserted"><ins><em>the snooping done by the phone company,
and perhaps by the OS in
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
the phone.</p>
<p>Don't be distracted by the question of whether the app developers
@@ -1694,7 +1691,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT skype -->
<li id="M201307110">
<p>Skype contains <a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
@@ -1711,7 +1707,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT games -->
<li id="M201806240">
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
@@ -1793,7 +1788,6 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-<!-- INSERT stings -->
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -1818,7 +1812,6 @@
before Amazon “smart” TVs.</p>
<ul class="blurbs">
-<!-- INSERT tvsets -->
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
@@ -1925,10 +1918,9 @@
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>nearby. Once</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
+ consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without</em></ins></span> your
- <span class="removed"><del><strong>Internet</strong></del></span> <span
class="inserted"><ins><em>consent to tracking, the TV will not
+ say, “Without your consent to tracking, the TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
@@ -1944,7 +1936,7 @@
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other</em></ins></span> devices <span
class="inserted"><ins><em>on the user's local network</a>.</p>
+ snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
@@ -1958,7 +1950,7 @@
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who</em></ins></span> are <span
class="removed"><del><strong>paired</strong></del></span> <span
class="inserted"><ins><em>watching TV.</p>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
@@ -1969,7 +1961,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT cameras -->
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
@@ -1993,7 +1984,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT toys -->
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
@@ -2018,8 +2008,7 @@
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard</em></ins></span> with <span class="removed"><del><strong>your
TV, advertisers can
- correlate ads</strong></del></span> <span
class="inserted"><ins><em>which manufacturers would make statements about their
+ standard with which manufacturers would make statements about their
products, rather than free software which users could have checked
and changed.</p>
@@ -2033,47 +2022,50 @@
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p>
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
+ customers.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>Web activity,</strong></del></span> <span
class="inserted"><ins><em>microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and
- <span class="removed"><del><strong>other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the FBI could listen to these
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>FBI could listen to these
conversations was unacceptable by itself.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201612060">
- <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="inserted"><ins><em>i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p></strong></del></span>
<span class="inserted"><ins><em>speech recognition
+ conversations</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>.</strong></del></span> Nuance <span
class="inserted"><ins><em>Communications</a>, a speech recognition
company based in the U.S.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p></em></ins></span>
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>save it and</strong></del></span>
<span class="inserted"><ins><em>remotely control the toys with a mobile phone.
This</em></ins></span> would <span class="removed"><del><strong>then have to
+ give it</strong></del></span> <span class="inserted"><ins><em>enable
+ crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>US or some other government.</p>
+ <p>Speech recognition is not</strong></del></span>
+ <span class="inserted"><ins><em>toys themselves.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p></em></ins></span>
+ <li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in your own computer.</p></strong></del></span>
<span class="inserted"><ins><em>spy on children and
adults</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -2083,12 +2075,12 @@
</div>
<ul class="blurbs">
-<!-- INSERT drones -->
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>the internet</strong></del></span>
<span class="inserted"><ins><em>you</a>.</p>
+ to snoop on other people, DJI is</em></ins></span> in <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
</ul>
@@ -2098,51 +2090,43 @@
</div>
<ul class="blurbs">
-<!-- INSERT home -->
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
- and <span class="removed"><del><strong>would then have to
- give</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
-
- <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the US
- <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span>
or <span class="removed"><del><strong>some other government.</p>
- <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>cease</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done
- by free software</strong></del></span> <span
class="inserted"><ins><em>sell the product</em></ins></span> in <span
class="removed"><del><strong>your own computer.</p></strong></del></span>
<span class="inserted"><ins><em>that country,
+ <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>user watches,</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+ and
+ <span class="removed"><del><strong>the switch to</strong></del></span>
<span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"></em></ins></span>
+ turn <span class="removed"><del><strong>this off has no effect. (The fact
that the
+ transmission reports</strong></del></span> <span
class="inserted"><ins><em>it into</em></ins></span> a <span
class="removed"><del><strong>404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>listening
device</a> for them.</p>
+
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>server
+ could save</strong></del></span> <span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>data anyway.)</p>
+
+ <p>Even worse, it</strong></del></span> <span
class="inserted"><ins><em>country,
do you think Amazon would have the moral fiber to say no?</p>
<p>These crackers are probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p></em></ins></span>
+ “hacking” to mean “breaking
security”</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what
the</strong></del></span>
+ <li id="M201804140">
+ <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its</em></ins></span>
user <span class="removed"><del><strong>watches, and</strong></del></span>
<span class="inserted"><ins><em>by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ offers a gratis electronic toothbrush that</em></ins></span> snoops on
<span class="removed"><del><strong>other devices on</strong></del></span> <span
class="inserted"><ins><em>its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>Internet</a>.</p>
</li>
<li id="M201706204">
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>turn this
off has no effect. (The fact that</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>server
- could save</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
-
- <p>Today's technological practice does not include any way of making
- a device</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</strong></del></span> <span
class="inserted"><ins><em>can obey your voice commands without potentially
spying</em></ins></span>
- on <span class="removed"><del><strong>the user's local
network.</a></p>
+ listen</em></ins></span> to <span class="removed"><del><strong>stop this,
but</strong></del></span> <span class="inserted"><ins><em>everyone in the
house, all the time</a>.</p>
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped,</em></ins></span> it
<span class="removed"><del><strong>had installed a patch to stop this, but any
product</strong></del></span> could <span class="removed"><del><strong>spy this
way.</p>
+ <p>Today's technological practice does not include</em></ins></span>
any <span class="removed"><del><strong>product</strong></del></span> <span
class="inserted"><ins><em>way of making
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it</em></ins></span> could <span
class="removed"><del><strong>spy this way.</p>
<p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>be saving up records
about you for later examination.</p>
@@ -2169,43 +2153,42 @@
</div>
<ul class="blurbs">
-<!-- INSERT wearables -->
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often</em></ins></span> people <span
class="removed"><del><strong>watch, and even</strong></del></span> <span
class="inserted"><ins><em>wear it</a>.</p>
<p>This will teach the sheeple to find it normal that companies
- monitor every aspect of</em></ins></span> what they <span
class="removed"><del><strong>wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>do.</p></em></ins></span>
+ monitor every aspect of</em></ins></span> what they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
</ul>
-<span class="inserted"><ins><em><h5
id="SpywareOnSmartWatches">“Smart” Watches</h5>
+<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
-<ul class="blurbs"></em></ins></span>
-<!-- <span
class="removed"><del><strong>#SpywareAtPlay</strong></del></span> <span
class="inserted"><ins><em>INSERT watches</em></ins></span> -->
-<span class="removed"><del><strong><div class="big-section">
- <h3 id="SpywareAtPlay">Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201603020">
+<ul class="blurbs">
+ <li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
<p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly
surveillance,</em></ins></span> at <span
class="removed"><del><strong>Play</h3></strong></del></span> <span
class="inserted"><ins><em>least.</p>
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
<li id="M201407090">
<p>An LG “smart” watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and to transmit conversations
- too</a>.</p>
+ to report its location</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>someone else and to transmit conversations
+ too</a>.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
-<div class="big-subsection">
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
<h4 id="SpywareInVehicles">Vehicles</h4></em></ins></span>
<span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
</div>
@@ -2215,11 +2198,9 @@
<li><p>Many</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT cars -->
<li id="M201711230">
- <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ <p>AI-powered driving apps can <a
+
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p>
</li>
@@ -2233,14 +2214,15 @@
<p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>make changes in various
+ access its computers remotely and make changes in various
settings</a>.</p>
<p>That's easy to do because the system has no authentication
when accessed through the modem. However, even if it asked
for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
+ has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
<p>Even if no one connects</em></ins></span> to the
@@ -2296,7 +2278,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT virtual -->
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
creates</em></ins></span> the <span class="removed"><del><strong>game
play</strong></del></span> <span
class="inserted"><ins><em>potential</em></ins></span> for <span
class="removed"><del><strong>specific players.</p>
@@ -2334,7 +2315,6 @@
<li><p>Online</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT websites -->
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
@@ -2418,7 +2398,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT javascript -->
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -2445,35 +2424,34 @@
<p>Some websites send
JavaScript code to collect all</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>user's input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
- can then be used to reproduce the whole session</a>.</p>
+ can then be used</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>reproduce the whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
+ code.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
-<div class="big-subsection">
+
+<span class="inserted"><ins><em><div class="big-subsection">
<h4 id="SpywareInFlash">Flash</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
</div>
<ul class="blurbs">
-<!-- INSERT flash -->
<li id="M201310110">
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>identify users.</p>
+ “fingerprinting” devices</a></em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>identify
users.</p>
</li>
<li id="M201003010">
<p>Flash Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track
visitors</a>.</p></em></ins></span>
+ cookie feature helps web sites track visitors</a>.</p>
</li>
-</ul>
-
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items on top under each subsection --></strong></del></span>
+</ul></em></ins></span>
<div class="big-subsection">
@@ -2485,7 +2463,6 @@
<li><p>Google</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT chrome -->
<li id="M201507280">
<p>Google</em></ins></span> Chrome makes it easy for an extension to
do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
@@ -2567,7 +2544,6 @@
real</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT networks -->
<li id="M201606030">
<p>Investigation Shows</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
@@ -2651,7 +2627,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/07 22:29:14 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/proprietary-surveillance.ru-en.html 7 Oct 2018 22:29:14 -0000
1.130
+++ po/proprietary-surveillance.ru-en.html 17 Oct 2018 10:01:36 -0000
1.131
@@ -179,7 +179,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT windows -->
<li id="M201712110">
<p>HP's proprietary operating system <a
href="http://www.bbc.com/news/technology-42309371">includes a
@@ -345,7 +344,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT macos -->
<li id="M201809070">
<p>Adware Doctor, an ad blocker for MacOS, <a
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
@@ -408,7 +406,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT bios -->
<li id="M201509220">
<p><a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
@@ -435,7 +432,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT phones -->
<li id="M201601110">
<p>The natural extension of monitoring
people through “their” phones is <a
@@ -483,7 +479,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT ithings -->
<li id="M201711250">
<p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
@@ -606,7 +601,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT android -->
<li id="M201711210">
<p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
@@ -700,7 +694,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT e-readers -->
<li id="M201603080">
<p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
@@ -742,7 +735,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT apps -->
<li id="M201808030">
<p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
@@ -1145,7 +1137,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT skype -->
<li id="M201307110">
<p>Skype contains <a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
@@ -1162,7 +1153,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT games -->
<li id="M201806240">
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
@@ -1244,7 +1234,6 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-<!-- INSERT stings -->
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -1269,7 +1258,6 @@
before Amazon “smart” TVs.</p>
<ul class="blurbs">
-<!-- INSERT tvsets -->
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
@@ -1419,7 +1407,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT cameras -->
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
@@ -1443,7 +1430,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT toys -->
<li id="M201711244">
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
@@ -1526,7 +1512,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT drones -->
<li id="M201708040">
<p>While you're using a DJI drone
to snoop on other people, DJI is in many cases <a
@@ -1541,7 +1526,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT home -->
<li id="M201808120">
<p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
@@ -1595,7 +1579,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT wearables -->
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
@@ -1610,7 +1593,6 @@
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
-<!-- INSERT watches -->
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
@@ -1635,7 +1617,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT cars -->
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
@@ -1698,7 +1679,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT virtual -->
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
creates the potential for the most intimate
@@ -1728,7 +1708,6 @@
but the surveillance is an abuse all the same.</p>
<ul class="blurbs">
-<!-- INSERT websites -->
<li id="M201805170">
<p>The Storyful program <a
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch">spies
@@ -1794,7 +1773,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT javascript -->
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -1835,7 +1813,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT flash -->
<li id="M201310110">
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
@@ -1856,7 +1833,6 @@
</div>
<ul class="blurbs">
-<!-- INSERT chrome -->
<li id="M201507280">
<p>Google Chrome makes it easy for an extension to do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
@@ -1892,7 +1868,6 @@
<div style="clear: left;"></div>
<ul class="blurbs">
-<!-- INSERT networks -->
<li id="M201606030">
<p>Investigation Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
@@ -1969,7 +1944,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/07 22:29:14 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tethers.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-tethers.fr-en.html 9 Oct 2018 13:30:42 -0000 1.19
+++ po/proprietary-tethers.fr-en.html 17 Oct 2018 10:01:36 -0000 1.20
@@ -33,10 +33,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
<ul class="blurbs">
-<!-- INSERT tethers -->
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -219,7 +218,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-tethers.ja-diff.html 9 Oct 2018 13:30:42 -0000 1.17
+++ po/proprietary-tethers.ja-diff.html 17 Oct 2018 10:01:36 -0000 1.18
@@ -47,10 +47,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
<ul class="blurbs">
-<!-- INSERT tethers -->
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -92,7 +91,7 @@
turning off the server through which the products' supposed owners
communicate with them</a>.</p>
- <p>The owners suspect this</em></ins></span> is <span
class="inserted"><ins><em>to pressure them to buy a newer model. If
+ <p>The owners suspect this is to pressure them to buy a newer model.
If
they are wise, they will learn, rather, to distrust any product that
requires users to talk with them through some specialized
service.</p>
</li>
@@ -100,10 +99,7 @@
<li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and</em></ins></span> tethered to a <span
class="removed"><del><strong>server.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>server that
requires
+ with a universal back door, and tethered to a server that requires
a subscription</a>.</p>
</li>
@@ -117,8 +113,8 @@
<p>With manufacturers like these, who needs security
breakers?</p>
<p>The purchasers should learn the larger lesson and reject connected
- appliances with embedded proprietary software. Every such product is
- a temptation to commit sabotage.</p>
+ appliances with embedded proprietary software. Every such
product</em></ins></span> is
+ <span class="inserted"><ins><em>a temptation to commit sabotage.</p>
</li>
<li id="M201705180">
@@ -130,7 +126,10 @@
<li id="M201704120">
<p>Anova sabotaged users' cooking devices
- with a downgrade that tethered them to a remote server. <a
+ with a downgrade that</em></ins></span> tethered <span
class="inserted"><ins><em>them</em></ins></span> to a <span
class="removed"><del><strong>server.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>remote
server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their cookers won't
function</a>.</p>
@@ -248,7 +247,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tethers.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary-tethers.ru-en.html 9 Oct 2018 13:30:42 -0000 1.18
+++ po/proprietary-tethers.ru-en.html 17 Oct 2018 10:01:36 -0000 1.19
@@ -33,10 +33,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
<ul class="blurbs">
-<!-- INSERT tethers -->
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -219,7 +218,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tyrants.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-tyrants.fr-en.html 9 Oct 2018 13:30:42 -0000 1.19
+++ po/proprietary-tyrants.fr-en.html 17 Oct 2018 10:01:36 -0000 1.20
@@ -35,10 +35,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
<ul class="blurbs">
-<!-- INSERT tyrants -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -161,7 +160,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tyrants.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-tyrants.it-diff.html 9 Oct 2018 13:30:42 -0000 1.8
+++ po/proprietary-tyrants.it-diff.html 17 Oct 2018 10:01:36 -0000 1.9
@@ -51,10 +51,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
<ul class="blurbs">
-<!-- INSERT tyrants -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -221,7 +220,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tyrants.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ja-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-tyrants.ja-diff.html 9 Oct 2018 13:30:42 -0000 1.8
+++ po/proprietary-tyrants.ja-diff.html 17 Oct 2018 10:01:36 -0000 1.9
@@ -51,10 +51,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
<ul class="blurbs">
-<!-- INSERT tyrants -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -221,7 +220,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tyrants.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-tyrants.ru-en.html 9 Oct 2018 13:30:42 -0000 1.19
+++ po/proprietary-tyrants.ru-en.html 17 Oct 2018 10:01:36 -0000 1.20
@@ -35,10 +35,9 @@
to present the specifics.</p>
</div>
</div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
<ul class="blurbs">
-<!-- INSERT tyrants -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -161,7 +160,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/proprietary.fr-en.html 14 Oct 2018 12:58:19 -0000 1.28
+++ po/proprietary.fr-en.html 17 Oct 2018 10:01:36 -0000 1.29
@@ -141,7 +141,6 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
-<!-- INSERT proprietary -->
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -256,7 +255,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:36 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/proprietary.it-diff.html 14 Oct 2018 11:58:30 -0000 1.13
+++ po/proprietary.it-diff.html 17 Oct 2018 10:01:37 -0000 1.14
@@ -179,7 +179,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
-<!-- INSERT proprietary -->
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -294,7 +293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/proprietary.ja-diff.html 14 Oct 2018 11:58:30 -0000 1.15
+++ po/proprietary.ja-diff.html 17 Oct 2018 10:01:37 -0000 1.16
@@ -152,10 +152,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -176,7 +176,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
-<!-- INSERT proprietary -->
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -291,7 +290,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/proprietary.nl-diff.html 14 Oct 2018 11:58:30 -0000 1.13
+++ po/proprietary.nl-diff.html 17 Oct 2018 10:01:37 -0000 1.14
@@ -44,13 +44,13 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em; }
-</style></em></ins></span>
+#TOC { width: 40em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -154,10 +154,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -179,7 +179,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
-<!-- INSERT proprietary -->
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -294,7 +293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/proprietary.pl-diff.html 14 Oct 2018 11:58:30 -0000 1.31
+++ po/proprietary.pl-diff.html 17 Oct 2018 10:01:37 -0000 1.32
@@ -40,8 +40,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -122,17 +122,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -153,10 +153,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -177,7 +177,6 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
-<!-- INSERT proprietary -->
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -292,7 +291,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pt-br-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary.pt-br-en.html 14 Oct 2018 23:57:58 -0000 1.4
+++ po/proprietary.pt-br-en.html 17 Oct 2018 10:01:37 -0000 1.5
@@ -141,7 +141,6 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
-<!-- INSERT proprietary -->
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -256,7 +255,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 23:57:58 $
+$Date: 2018/10/17 10:01:37 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/proprietary.ru-en.html 14 Oct 2018 13:28:28 -0000 1.29
+++ po/proprietary.ru-en.html 17 Oct 2018 10:01:37 -0000 1.30
@@ -141,7 +141,6 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
-<!-- INSERT proprietary -->
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -256,7 +255,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/14 13:28:28 $
+$Date: 2018/10/17 10:01:37 $
<!-- timestamp end -->
</p>
</div>