[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-amazon.de.html malware-...
From: |
GNUN |
Subject: |
www/proprietary malware-amazon.de.html malware-... |
Date: |
Sun, 21 Oct 2018 04:58:07 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/21 04:58:07
Modified files:
proprietary : malware-amazon.de.html malware-google.de.html
proprietary/po : malware-amazon.de-diff.html
malware-google.de-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.de.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.de.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.2&r2=1.3
Patches:
Index: malware-amazon.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.de.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-amazon.de.html 25 Oct 2017 11:30:12 -0000 1.4
+++ malware-amazon.de.html 21 Oct 2018 08:58:04 -0000 1.5
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-amazon.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-amazon.de.po">
+ https://www.gnu.org/proprietary/po/malware-amazon.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-amazon.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-amazon.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-08-22" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-amazon.en.html" -->
<!--#include virtual="/server/header.de.html" -->
<!-- Parent-Version: 1.84 -->
@@ -21,6 +26,7 @@
</style>
<!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
<h2>Amazons Software ist Schadsoftware</h2>
<p><a href="/proprietary/">Weitere Beispiele proprietärer
Schadsoftware</a></p>
@@ -253,7 +259,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/10/25 11:30:12 $
+$Date: 2018/10/21 08:58:04 $
<!-- timestamp end -->
</p>
Index: malware-google.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.de.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-google.de.html 19 May 2018 11:33:05 -0000 1.9
+++ malware-google.de.html 21 Oct 2018 08:58:07 -0000 1.10
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-google.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-google.de.po">
+ https://www.gnu.org/proprietary/po/malware-google.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-google.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/malware-google.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-08-22" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/malware-google.en.html" -->
<!--#include virtual="/server/header.de.html" -->
<!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/malware-google.translist" -->
<!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
<h2>Googles Software ist Schadsoftware</h2>
<p><a href="/proprietary/">Weitere Beispiele proprietärer
Schadsoftware</a></p>
@@ -403,7 +409,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2018/05/19 11:33:05 $
+$Date: 2018/10/21 08:58:07 $
<!-- timestamp end -->
</p>
Index: po/malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-amazon.de-diff.html 16 Apr 2017 09:59:32 -0000 1.1
+++ po/malware-amazon.de-diff.html 21 Oct 2018 08:58:07 -0000 1.2
@@ -11,42 +11,32 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.79 -->
-<span class="removed"><del><strong><title>Malware in the Kindle
Swindle</strong></del></span>
-<span class="inserted"><ins><em><title>Amazon's Software Is
Malware</em></ins></span>
+<!-- Parent-Version: <span
class="removed"><del><strong>1.84</strong></del></span> <span
class="inserted"><ins><em>1.86 -->
+<!--
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit lists with items such as <li id="Mnnnnnnnn">!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</em></ins></span>
+-->
+<title>Amazon's Software Is Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-amazon.translist" -->
-<style type="text/css" <span
class="removed"><del><strong>media="print,screen">
-<!--
-#content</strong></del></span> <span
class="inserted"><ins><em>media="print,screen"><!--</em></ins></span>
-div.toc <span class="removed"><del><strong>li</strong></del></span> { <span
class="removed"><del><strong>list-style: none; margin-bottom:
1em;</strong></del></span> <span class="inserted"><ins><em>width: 100%;
padding: 1.3em 3%;</em></ins></span> }
-<span class="removed"><del><strong>#content</strong></del></span>
-div.toc <span class="inserted"><ins><em>h3</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>display: inline; margin: 0 1.5%;</em></ins></span> }
-<span class="removed"><del><strong>-->
-</style></strong></del></span>
-<span class="inserted"><ins><em>div.toc ul { display: inline; margin: 0; }
+<span class="removed"><del><strong><style type="text/css"
media="print,screen"><!--
+div.toc { width: 100%; padding: 1.3em 3%; }
+div.toc h3 { display: inline; margin: 0 1.5%; }
+div.toc ul { display: inline; margin: 0; }
div.toc li {
display: inline;
list-style: none;
font-size: 1.3em;
margin: 0 1.5%;
}
---></style></em></ins></span>
+--></style></strong></del></span>
<!--#include virtual="/server/banner.html" -->
-<span class="removed"><del><strong><h2>Malware in the Kindle
Swindle</h2>
-
-<a</strong></del></span>
-<span class="inserted"><ins><em><h2>Amazon's Software Is
Malware</h2>
+<h2>Amazon's Software Is Malware</h2>
-<p><a</em></ins></span> href="/proprietary/proprietary.html">Other
examples of proprietary <span class="removed"><del><strong>malware</a>
-
-<p>We refer to this product as the
-<a href="/philosophy/why-call-it-the-swindle.html">Amazon
Swindle</a>
-because it has <a href="/philosophy/proprietary-drm.html">Digital
restrictions
-management (DRM)</a> and <a href="/philosophy/ebooks.html">
-other malicious functionalities</a>.</p></strong></del></span>
<span class="inserted"><ins><em>malware</a></p></em></ins></span>
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
-<div class="highlight-para">
+<div <span
class="removed"><del><strong>class="highlight-para"></strong></del></span>
<span class="inserted"><ins><em>class="comment"></em></ins></span>
<p>
Malware and nonfree software are two different issues. Malware means
the program is designed to mistreat or harm users when it runs. The
@@ -59,28 +49,41 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
-</div>
+<span class="removed"><del><strong></div></strong></del></span>
-<div <span
class="removed"><del><strong>class="toc"></strong></del></span> <span
class="inserted"><ins><em>class="toc c">
+<div <span class="removed"><del><strong>class="toc c">
<h3>Type of product:</h3>
<ul>
<li><a href="#swindle">Kindle Swindle</a></li>
<li><a href="#echo">Echo</a></li>
- </ul>
+ </ul></strong></del></span> <span
class="inserted"><ins><em>class="important">
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.</p></em></ins></span>
</div>
-<h2 id="swindle">Malware in the Kindle Swindle</h2>
+<span class="removed"><del><strong><h2</strong></del></span>
+<span class="inserted"><ins><em></div>
+
+<p class="c" style="font-size: 1.2em">
+ <a href="#swindle">Kindle Swindle</a>
+ <a href="#echo">Echo</a>
+ <a href="#misc">Other products</a>
+</p>
+
+<h3</em></ins></span> id="swindle">Malware in the Kindle <span
class="removed"><del><strong>Swindle</h2></strong></del></span> <span
class="inserted"><ins><em>Swindle</h3></em></ins></span>
<p>We refer to this product as the
<a href="/philosophy/why-call-it-the-swindle.html">Amazon
Swindle</a>
-because it has <a href="/philosophy/proprietary-drm.html">Digital
restrictions
+because it has <a href="/proprietary/proprietary-drm.html">Digital
restrictions
management (DRM)</a> and <a href="/philosophy/ebooks.html">
-other malicious functionalities</a>.</p></em></ins></span>
+other malicious functionalities</a>.</p>
-<div <span
class="removed"><del><strong>class="malfunctions"></strong></del></span>
<span class="inserted"><ins><em>class="summary" style="margin-top: 1em">
- <h3>Type of malware</h3></em></ins></span>
+<span class="removed"><del><strong><div class="summary" style="margin-top:
1em">
+ <h3>Type of malware</h3>
<ul>
-<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a
href="#censorship">Censorship</a></li>-->
<!--<li><a
href="#insecurity">Insecurity</a></li>-->
@@ -89,73 +92,155 @@
<li><a href="#surveillance">Surveillance</a></li>
<li><a href="#drm">Digital restrictions
management</a> or “DRM” means functionalities
designed
- to restrict what users can do with the data in their
computers.</li>
+ to restrict what users can do with</strong></del></span>
+
+<span class="inserted"><ins><em><h4 id="back-doors">Back Doors</h4>
+
+<ul class="blurbs">
+ <li id="M201503210">
+ <p>Amazon <a
+
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
+ downgraded</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>software</em></ins></span> in <span
class="removed"><del><strong>their computers.</li>
<!--<li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>-->
- <!--<li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system not “authorized” by the
+ <!--<li><a
href="#tyrants">Tyrants</a>—systems</strong></del></span> <span
class="inserted"><ins><em>users' Swindles</a> so</em></ins></span> that
<span class="removed"><del><strong>reject any operating system not
“authorized” by the
manufacturer.</li>-->
</ul>
</div>
-<span class="removed"><del><strong></div></strong></del></span>
<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
<ul>
- <li>
- <p>The Amazon Kindle-Swindle has a back door that has been used to
- <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
- remotely erase books</a>. One of the books erased was 1984, by
George Orwell.
- </p>
-
- <p>Amazon responded to criticism by saying it would delete books only
- following orders from the state. However, that policy didn't last.
- In 2012
- it <a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
- a user's Kindle-Swindle and deleted her account</a>, then offered
her
- kafkaesque “explanations.”</p>
- </li>
-
- <li>
- <p>The Kindle also has a
- <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
+ <li></strong></del></span> <span class="inserted"><ins><em>those
already
+ rooted would cease to function at all.</p>
+ </li>
+
+ <li id="M201210221"></em></ins></span>
+ <p>The Amazon Kindle-Swindle has a back door that has been used to
<a
+
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+ remotely erase books</a>. One of the books erased was <span
class="removed"><del><strong>1984,</strong></del></span>
+ <span
class="inserted"><ins><em><cite>1984</cite>,</em></ins></span> by
George <span class="removed"><del><strong>Orwell.
+ </p></strong></del></span> <span
class="inserted"><ins><em>Orwell.</p></em></ins></span>
+
+ <p>Amazon responded to criticism by saying it
+ would delete books only following orders from the
+ state. However, that policy didn't last. In 2012 it <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+ wiped</em></ins></span> a user's Kindle-Swindle and deleted her
account</a>, then
+ offered her kafkaesque “explanations.”</p>
+ </li>
+
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200700000"></em></ins></span>
+ <p>The Kindle also has a <a
+
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
universal back door</a>.</p>
- <p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
+ <span class="removed"><del><strong><p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
downgraded the software in users' Swindles</a>
- so that those already rooted would cease to function at
all.</p></li>
+ so that those already rooted would cease to function at
all.</p></li></strong></del></span>
+ <span class="inserted"><ins><em></li></em></ins></span>
</ul>
-<h3 id="surveillance">Amazon Kindle Swindle Surveillance</h3>
+<span class="removed"><del><strong><h3 id="surveillance">Amazon Kindle
Swindle Surveillance</h3>
<ul>
- <li><p>The Electronic Frontier Foundation has examined and found
<a
- href="https://www.eff.org/pages/reader-privacy-chart-2012">various kinds
of
- surveillance in the Swindle and other
e-readers</a>.</p></li>
+ <li><p>The</strong></del></span>
+
+
+<span class="inserted"><ins><em><h4
id="surveillance">Surveillance</h4>
+
+<ul class="blurbs">
+ <li id="M201212031">
+ <p>The</em></ins></span> Electronic Frontier Foundation has examined
and found <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012">various
+ kinds of surveillance in the Swindle and other <span
class="removed"><del><strong>e-readers</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>e-readers</a>.</p>
+ </li></em></ins></span>
</ul>
-<h3 id="drm">Amazon Kindle Swindle DRM</h3>
+<span class="removed"><del><strong><h3 id="drm">Amazon Kindle Swindle
DRM</h3>
<ul>
- <li><p><a
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
+ <li><p><a</strong></del></span>
+
+
+<span class="inserted"><ins><em><h4 id="drm">DRM</h4>
+
+<ul class="blurbs">
+ <li id="M201704131">
+ <p><a</em></ins></span>
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
- whatever Amazon might do to its users is legitimate. It refers to DRM
- as digital “rights” management, which is the spin term
- used to promote DRM. Nonetheless it serves as a reference for the
- facts.</p></li>
+ whatever Amazon might do to its users is legitimate. It refers to
+ DRM as digital “rights” management, which is the spin
+ term used to promote DRM. Nonetheless it serves as a reference for
+ the
+ <span
class="removed"><del><strong>facts.</p></li></strong></del></span>
<span class="inserted"><ins><em>facts.</p>
+ </li></em></ins></span>
</ul>
-<span class="inserted"><ins><em><h2 id="echo">Malware in the
Echo</h2>
+<span class="removed"><del><strong><h2</strong></del></span>
+
+
+
+<span class="inserted"><ins><em><h3</em></ins></span> id="echo">Malware
in the <span class="removed"><del><strong>Echo</h2>
<h3>Amazon Echo Back Doors</h3>
<ul>
- <li><p>The Amazon Echo appears to have a universal back door,
since
- <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
+ <li><p>The</strong></del></span> <span
class="inserted"><ins><em>Echo</h3>
+
+<h4 id="echo-back-doors">Back Doors</h4>
+
+<ul class="blurbs">
+ <li id="M201606060">
+ <p>The</em></ins></span> Amazon Echo appears to have a universal
back door, since <a
+ href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
it installs “updates” automatically</a>.</p>
- <p>We have found nothing explicitly documenting the lack of any way
to
- disable remote changes to the software, so we are not completely sure
- there isn't one, but it seems pretty clear.</p>
+
+ <p>We have found nothing explicitly documenting the lack of any way
+ to disable remote changes to the software, so we are not completely
+ sure there isn't one, but <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> seems pretty clear.</p>
+ </li>
+</ul>
+
+
+<span class="inserted"><ins><em><h4
id="echo-surveillance">Surveillance</h4>
+
+<ul class="blurbs">
+ <li id="M201808120">
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
+
+ <p>These crackers are probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking” to mean “breaking
security”</a>.</p>
+ </li>
+</ul>
+
+
+
+<h3 id="misc"> Malware in other products</h3>
+
+<ul class="blurbs">
+ <li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system has a grave security flaw.</p>
+ </li>
+
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
</li>
</ul></em></ins></span>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -203,17 +288,18 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
-Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
+<span
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/">Creative</em></ins></span>
+Commons <span
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span>
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International
License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/04/16 09:59:32 $
+$Date: 2018/10/21 08:58:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-google.de-diff.html 30 Sep 2017 11:02:06 -0000 1.2
+++ po/malware-google.de-diff.html 21 Oct 2018 08:58:07 -0000 1.3
@@ -11,7 +11,12 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.83</strong></del></span> <span
class="inserted"><ins><em>1.84</em></ins></span> -->
+<!--
+<span
class="inserted"><ins><em>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Please do not edit lists with items such as <li id="Mnnnnnnnn">!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
+<!--</em></ins></span> Parent-Version: 1.84 -->
<title>Google's Software Is Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-google.translist" -->
@@ -22,11 +27,11 @@
<p><a href="/proprietary/proprietary.html">Other examples of
proprietary
malware</a></p>
-<div class="highlight-para">
+<div <span
class="removed"><del><strong>class="highlight-para"></strong></del></span>
<span class="inserted"><ins><em>class="comment"></em></ins></span>
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
-This page explains how Google software is malware.
+This page explains how <span
class="removed"><del><strong>Google</strong></del></span> <span
class="inserted"><ins><em>Google's</em></ins></span> software is malware.
</p>
<p>Malware and nonfree software are two different issues. The
@@ -39,83 +44,177 @@
because the developer's awareness that the users would be powerless to fix
any malicious functionalities tempts the developer to impose some.
</p>
+<span class="removed"><del><strong></div></strong></del></span>
+
+<div <span class="removed"><del><strong>class="summary"
style="margin-top:</strong></del></span> <span
class="inserted"><ins><em>class="important"
style="margin-bottom:</em></ins></span> 2em">
+<span class="inserted"><ins><em><p>If you know of an example that ought
to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.</p>
+</div>
</div>
-<div class="summary" style="margin-top: 2em">
- <h3><strong>Type of malware</strong></h3>
- <ul>
+<div class="summary"></em></ins></span>
+<h3><strong>Type of malware</strong></h3>
+<ul>
<li><a href="#back-doors">Back doors</a></li>
<li><a href="#censorship">Censorship</a></li>
- <li><a href="#insecurity">Insecurity</a></li>
- <!--<li><a
href="#pressuring">Pressuring</a></li>-->
+ <span class="removed"><del><strong><li><a
href="#insecurity">Insecurity</a></li></strong></del></span>
+<!--<li><a <span
class="removed"><del><strong>href="#pressuring">Pressuring</a></li>-->
<li><a href="#sabotage">Sabotage</a></li>
- <li><a href="#surveillance">Surveillance</a></li>
+ <li><a
href="#surveillance">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="#deception">Deception</a></li>--></em></ins></span>
<li><a href="#drm">Digital restrictions
- management</a> or “DRM” means functionalities
designed
+ management</a> or <span
class="removed"><del><strong>“DRM” means
functionalities</strong></del></span> <span
class="inserted"><ins><em>“DRM”—functionalities</em></ins></span>
designed
to restrict what users can do with the data in their
computers.</li>
- <!--<li><a href="#jails">Jails</a>—systems
+ <span class="inserted"><ins><em><li><a
href="#insecurity">Insecurity</a></li></em></ins></span>
+<!--<li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>-->
- <li><a href="#tyrants">Tyrants</a>—systems
+ <li><a <span
class="inserted"><ins><em>href="#sabotage">Sabotage</a></li>
+ <li><a href="#surveillance">Surveillance</a></li>
+ <li><a</em></ins></span>
href="#tyrants">Tyrants</a>—systems
that reject any operating system not “authorized” by the
manufacturer.</li>
- <!--<li><a
href="#deception">Deception</a></li>-->
- </ul>
+ <span class="removed"><del><strong><!--<li><a
href="#deception">Deception</a></li>--></strong></del></span>
+</ul>
</div>
<h3 id="back-doors">Google Back Doors</h3>
-<ul>
- <li id="back-door-dup1"><p>Chrome has a back door <a
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">for
- remote erasure of add-ons</a>.</p>
- </li>
- <li><p>In Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete apps.</a> (It is in a
program
- called GTalkService).</p>
-
- <p>Google can also
- <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService (which
- seems, since that article, to have been merged into Google Play).
- This is not equivalent to a universal back door, but permits various
- dirty tricks.</p>
+
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201809140">
+ <p>Android has a <a
+
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
+ back door for remotely changing “user”
settings</a>.</p>
+
+ <p>The article suggests it might be a universal back door, but this
+ isn't clear.</p>
+ </li>
+
+ <li id="M201202280"></em></ins></span>
+ <p>ChromeOS has a universal back
+ door. At least, Google says it does—in <a
+ href="https://www.google.com/intl/en/chromebook/termsofservice.html">
+ section 4 of the EULA</a>.</p>
+ </li>
+
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201103070"></em></ins></span>
+ <p>In Android, <a
+
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> in a
+ program called <span
class="removed"><del><strong>GTalkService).</p></strong></del></span>
<span class="inserted"><ins><em>GTalkService, which seems since then to have
been
+ merged into Google Play.)</p></em></ins></span>
+
+ <p>Google can also <a
+
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
+ seems, since that article, to have been merged into Google
Play).</strong></del></span> <span
class="inserted"><ins><em>GTalkService.</em></ins></span> This is
+ not equivalent to a universal back door, but permits various dirty
+ tricks.</p>
<p>Although Google's <em>exercise</em> of this power has
not been
malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to let a
- security service remotely <em>deactivate</em> programs that
it
- considers malicious. But there is no excuse for allowing it
- to <em>delete</em> the programs, and you should have the
right to
- decide who (if anyone) to trust in this way.</p></li>
-
+ which could also be used maliciously. You might well decide to
+ let a security service remotely <em>deactivate</em> programs
that
+ it considers malicious. But there is no excuse for allowing it to
+ <em>delete</em> the programs, and you should have the right to
decide
+ who (if anyone) to trust in this <span
class="removed"><del><strong>way.</p></li></strong></del></span>
<span class="inserted"><ins><em>way.</p>
+ </li></em></ins></span>
</ul>
+
+
<h3 id="censorship">Google Censorship</h3>
-<ul>
- <li><p>Google Chrome, running on Windows, <a
-
href="https://thenextweb.com/google/2014/05/27/google-starts-blocking-extensions-chrome-web-store-windows-users-disables-installed-ones/">
- is a jail</a>.</p>
- </li>
- <li><p>Google
- <a
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201703160">
+ <p>Google <a
+
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
offers censorship software</a>, ostensibly for parents to put into
their children's computers.</p>
</li>
- <li><p>Chrome is <a href="#back-door-dup1">censored by a
back door</a>
- described above.</p></li>
- <li><p><a
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">Google
- censored installation of Samsung's ad-blocker,</a> saying that
- blocking ads is “interference” with the sites that
- advertise (and surveil users through ads).</p>
-
- <p>The ad-blocker is proprietary software, just like the program
(Google
- Play) that Google used to deny access to install it. Using a nonfree
program
- gives the owner power over you, and Google has exercised that
power.</p>
-
- <p>Google's censorship, unlike that of Apple and Microsoft, is not
total:
- Android allows users to install apps in other ways. You can install
- free programs from f-droid.org.</p></li>
+ <li id="M201701180"></em></ins></span>
+ <p>On Windows and MacOS, Chrome <a
+
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq">
+ disables extensions</a> that are not hosted in the Chrome Web
+ Store.</p>
+
+ <p>For example, an extension was <a
+
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/">
+ banned from the Chrome Web Store, and permanently disabled</a> on
+ more than 40,000 <span
class="removed"><del><strong>computers.</p></li>
+
+ <li></strong></del></span> <span
class="inserted"><ins><em>computers.</p>
+ </li>
+
+ <li id="M201602030"></em></ins></span>
+ <p><a
+
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones">
+ Google censored installation of Samsung's ad-blocker</a> on Android
+ phones, saying that blocking ads is “interference” with
+ the sites that advertise (and surveil users through ads).</p>
+
+ <p>The ad-blocker is proprietary software, just like the program
+ (Google Play) that Google used to deny access to install it. Using
+ a nonfree program gives the owner power over you, and Google has
+ exercised that power.</p>
+
+ <p>Google's censorship, unlike that of Apple, is not total: Android
+ allows users to install apps in other ways. You can install free
+ programs from <span
class="removed"><del><strong>f-droid.org.</p></li>
+
+ <li></strong></del></span> <span
class="inserted"><ins><em>f-droid.org.</p>
+ </li>
+</ul>
+
+
+<h3 id="drm">Google DRM</h3>
+
+<ul class="blurbs">
+ <li id="M201705150"></em></ins></span>
+ <p>Google <span class="inserted"><ins><em>now allows Android
+ apps to detect whether a device has been rooted,</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts">
+ offers censorship software</a>, ostensibly for
parents</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
+ refuse</em></ins></span> to <span class="removed"><del><strong>put into
+ their children's computers.</p></li></strong></del></span>
<span class="inserted"><ins><em>install if so</a>. The Netflix app uses
this ability to
+ enforce DRM by refusing to install on rooted Android devices.</p>
+
+ <p>Update: Google <i>intentionally</i> changed Android
so that apps <a
+
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/">can
+ detect rooted devices and refuse to run on them</a>. The Netflix app
+ is proprietary malware, and one shouldn't use it. However, that does
+ not make what Google has done any less wrong.</p>
+ </li>
+
+ <li id="M201701300">
+ <p>Chrome <a
+
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements
+ DRM</a>. So does Chromium, through nonfree software that is
effectively
+ part of it.</p>
+
+ <p><a
+ href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430">More
+ information</a>.</p>
+ </li>
+
+ <li id="M201102250">
+ <p>Android <a
+
href="https://developer.android.com/reference/android/drm/package-summary.html">
+ contains facilities specifically to support DRM</a>.</p>
+ </li></em></ins></span>
</ul>
+
<h3 id="insecurity">Google Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
@@ -123,98 +222,226 @@
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
-<ul>
- <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones, Android, and
- BlackBerry</a>. While there is not much detail here, it seems that
- this does not operate via the universal back door that we know nearly
- all portable phones have. It may involve exploiting various bugs.
- There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio
software</a>.</p></li>
+<span class="removed"><del><strong><ul>
+ <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201311120">
+ <p><a
+
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></em></ins></span>
+ The NSA can tap data in smart phones, including iPhones,
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via
+ the universal back door that we know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs in the phones' radio <span
class="removed"><del><strong>software</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>software</a>.</p>
+ </li></em></ins></span>
</ul>
+
<h3 id="sabotage">Google Sabotage</h3>
<p>The wrongs in this section are not precisely malware, since they do
not involve making the program that runs in a way that hurts the user.
But they are a lot like malware, since they are technical Google
-actions that harm to the users of specific Google software.</p>
+actions that harm <span class="removed"><del><strong>to</strong></del></span>
the users of specific Google software.</p>
-<ul>
- <span class="inserted"><ins><em><li>
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201605150"></em></ins></span>
<p>Revolv is an IoT device which managed “smart home”
operations: switching the lights, operate motion sensors, regulating
- temperature, etc. On May 15th, 2016, Google said it would shut down the
- service linked to the device, making it unusable.</p>
- <p>Although you may own the device, its functioning depended on the
server
- that never belonged to you. So you never really had control of it. This
- unjust design is called
- <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+ temperature, etc. On May 15th, 2016, Google said it would shut down
+ the service linked to the device, making it unusable.</p>
+
+ <p>Although you may own the device, its functioning depended
+ on the server that never belonged to you. So you never
+ really had control of it. This unjust design is called <a
+ href="/philosophy/network-services-arent-free-or-nonfree.html">
Service as a Software Substitute (SaaSS)</a>. That is what gave the
- company the power to convert it into a $300 out-of-warranty brick, for
- your “dumb home”.</p>
- </li></em></ins></span>
- <li><p>Google has long had <a
+ company the power to convert it into a $300 out-of-warranty brick,
+ for your “dumb home”.</p>
+ </li>
+ <span class="removed"><del><strong><li><p>Google has long
had</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604050">
+ <p>Google/Alphabet</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+ back door</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+ intentionally broke Revolv home automatic control products that
+ depended on a server</a></em></ins></span> to <span
class="removed"><del><strong>remotely unlock an</strong></del></span> <span
class="inserted"><ins><em>function, by shutting down the server.
+ The lesson is, reject all such products. Insist on self-contained
+ computers that run free software!</p>
+ </li>
+
+ <li id="M201511244">
+ <p>Google has long had <a
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door to remotely unlock an Android device</a>, unless its
- disk is encrypted (possible since Android 5.0 Lollipop, but
- still not quite the default).</p></li>
+ back door to remotely unlock an</em></ins></span> Android
device</a>, unless its disk
+ is encrypted (possible since Android 5.0 Lollipop, but still not
+ quite the <span
class="removed"><del><strong>default).</p></li></strong></del></span>
<span class="inserted"><ins><em>default).</p>
+ </li></em></ins></span>
</ul>
+
<h3 id="surveillance">Google Surveillance</h3>
-<ul>
- <li><p>Google Chrome contains a key logger that
- <a
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL typed in</a>, one key at a time.</p>
+<span class="removed"><del><strong><ul>
+ <li><p>Tracking software in popular Android</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201808030">
+ <p>Some Google</em></ins></span> apps <span
class="removed"><del><strong>is pervasive and
+ sometimes very clever. Some trackers can</strong></del></span> <span
class="inserted"><ins><em>on Android</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the</em></ins></span> user's <span
class="removed"><del><strong>movements around a physical
store</strong></del></span> <span class="inserted"><ins><em>location even when
users disable “location
+ tracking”</a>.</p>
+
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked</em></ins></span> by <span
class="removed"><del><strong>noticing WiFi
+ networks</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the misleading control.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711210">
+ <p>Android</em></ins></span> tracks location for Google <a
+
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even when
+ the phone has no SIM <span
class="removed"><del><strong>card</a>.</p></li>
+
+ <li><p>Google Chrome contains a key logger
that</strong></del></span> <span
class="inserted"><ins><em>card</a>.</p>
+ </li>
+
+ <li id="M201609210">
+ <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li id="M201609140">
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable</em></ins></span> Google <span
class="removed"><del><strong>every URL typed in</a>, one key
at</strong></del></span> <span class="inserted"><ins><em>Maps and location
tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
+ when it's actually doing something else. Such</em></ins></span> a <span
class="removed"><del><strong>time.</p></strong></del></span> <span
class="inserted"><ins><em>thing would be almost
+ unthinkable with free software.</p></em></ins></span>
</li>
- <li><p>Google Chrome includes a module that
- <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ <span
class="removed"><del><strong><li><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507280">
+ <p>Google Chrome makes it easy for an extension to do <a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping on the user's browsing</a>, and many of them do
so.</p>
+ </li>
+
+ <li id="M201506180">
+ <p>Google</em></ins></span> Chrome includes a module that <a
+
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
activates microphones and transmits audio to its
servers</a>.</p>
</li>
- <li><p>Spyware is present in some Android devices when they are
sold.
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
Some Motorola phones modify Android to
- <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p>
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers</em></ins></span> send
<span class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em><a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot
of</em></ins></span>
+ data <span class="removed"><del><strong>to
Motorola</a>.</p></strong></del></span> <span
class="inserted"><ins><em>about the user</a>.</p></em></ins></span>
</li>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308040">
+ <p>Google Chrome <a
+ href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ spies on browser history, affiliations</a>, and other installed
+ software.</p>
</li>
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <li id="M201308010">
+ <p>Spyware</em></ins></span> in Android phones (and Windows?
laptops): The Wall Street
+ Journal (in an article blocked from us by a paywall) reports that <a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android phones
+ and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li id="nest-thermometers">
- <p>Nest thermometers
- send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
+
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
+ <p>Spyware is present in some Android devices when they are
+ sold. Some Motorola phones, made when this company was owned
+ by Google, use a modified version of Android that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data to Motorola</a>.</p>
</li>
- <li><p>Many web sites report all their visitors to Google by
using
- the Google Analytics service, which
- <a
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
- tells Google the IP address and the page that was
visited.</a></p>
+ <li id="M201307250">
+ <p>A Motorola phone <a
+
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice</em></ins></span> all <span
class="removed"><del><strong>conversations</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the time</a>.</p></em></ins></span>
+ </li>
+
+ <li <span class="removed"><del><strong>id="nest-thermometers">
+ <p>Nest thermometers
+ send</strong></del></span> <span
class="inserted"><ins><em>id="M201302150">
+ <p>Google Play intentionally sends app developers</em></ins></span>
<a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details</em></ins></span> of <span
class="removed"><del><strong>data about</strong></del></span> <span
class="inserted"><ins><em>users that install</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
+
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201208210">
+ <p>Many</em></ins></span> web sites report all their visitors
+ to Google by using the Google Analytics service, which <a
+
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/">
+ tells Google the IP address and the page that was <span
class="removed"><del><strong>visited.</a></p></strong></del></span>
<span class="inserted"><ins><em>visited</a>.</p></em></ins></span>
</li>
- <li><p>Google Chrome makes it easy for an extension to do <a
+ <span class="removed"><del><strong><li><p>Google Chrome makes it
easy for an extension to do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping on the user's browsing</a>, and many of them do
so.</p>
</li>
</ul>
<h3 id="drm">Google DRM</h3>
-<ul>
+<ul></strong></del></span>
-<li>
-<p>Google now allows Android apps to detect whether a device has been
+ <li <span
class="removed"><del><strong>id="netflix-app-geolocation-drm"><p>The
Netflix Android app <a
+href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+forces the use of Google DNS</a>. This is one of the methods that Netflix
+uses to enforce the geolocation restrictions dictated by the movie
+studios.</p>
+</li>
+
+<li></strong></del></span> <span
class="inserted"><ins><em>id="M200809060"></em></ins></span>
+ <p>Google <span class="removed"><del><strong>now allows Android apps
to detect whether</strong></del></span> <span class="inserted"><ins><em>Chrome
contains</em></ins></span> a <span class="removed"><del><strong>device has been
rooted, <a
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/">and
refuse to install
if so</a>.</p>
@@ -225,27 +452,38 @@
<li>
<p>Chrome <a
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html">implements
- DRM</a>. So does Chromium, through nonfree software that is
+ DRM</a>. So does Chromium, through nonfree
software</strong></del></span> <span class="inserted"><ins><em>key
logger</em></ins></span> that <span class="removed"><del><strong>is
effectively part of it.</p>
<p><a
href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430">More
information</a>.</p>
</li>
-<li><p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">contains
-facilities specifically to support DRM.</a></p>
-</li>
+<li><p>Android</strong></del></span> <a <span
class="removed"><del><strong>href="https://developer.android.com/reference/android/drm/package-summary.html">contains
+facilities specifically to support
DRM.</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends Google every URL typed in</a>, one key at a
time.</p></em></ins></span>
+ </li>
</ul>
+
<h3 id="tyrants">Google Tyrants</h3>
-<ul>
+<span class="removed"><del><strong><ul>
<li>
-<p><a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
-Some Android phones made by Google are tyrants</a> (though someone found
a way to
-crack the restriction). Fortunately, most Android devices are not tyrants.
-</p>
-</li>
+<p><a</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201304080">
+ <p>Motorola, then owned by Google, made <a</em></ins></span>
+
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
+<span class="removed"><del><strong>Some</strong></del></span>
+ Android phones <span class="removed"><del><strong>made by
Google</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> are tyrants</a> (though
someone found a way to
+ crack the restriction). Fortunately, most Android devices are not <span
class="removed"><del><strong>tyrants.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>tyrants.</p></em></ins></span>
+ </li>
</ul>
+
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -293,17 +531,18 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2017, 2018 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
-Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
+<span
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/">Creative</em></ins></span>
+Commons <span
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span>
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International
License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/09/30 11:02:06 $
+$Date: 2018/10/21 08:58:07 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-amazon.de.html malware-...,
GNUN <=