[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-cars.de-diff.html ma...
From: |
GNUN |
Subject: |
www/proprietary/po malware-cars.de-diff.html ma... |
Date: |
Fri, 26 Oct 2018 02:58:58 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/26 02:58:57
Modified files:
proprietary/po : malware-cars.de-diff.html malware-cars.de.po
malware-cars.fr.po malware-cars.pot
malware-cars.ru.po
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de.po proprietary.es.po
proprietary.fr.po proprietary.it-diff.html
proprietary.it.po proprietary.ja-diff.html
proprietary.ja.po proprietary.nl-diff.html
proprietary.nl.po proprietary.pl-diff.html
proprietary.pl.po proprietary.pot
proprietary.pt-br.po proprietary.ru.po
proprietary.zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.223&r2=1.224
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.416&r2=1.417
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.17&r2=1.18
Patches:
Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-cars.de-diff.html 25 Oct 2018 10:31:08 -0000 1.8
+++ malware-cars.de-diff.html 26 Oct 2018 06:58:57 -0000 1.9
@@ -63,21 +63,39 @@
<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a></em></ins></span> in its
<span class="removed"><del><strong>software</strong></del></span>
+ <span class="inserted"><ins><em>“connected” cars, minute by
minute.</p>
+
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>limit
customers</strong></del></span> <span class="inserted"><ins><em>you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want</em></ins></span> to
+<span class="removed"><del><strong>using just</strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
+ hardware cannot collect any of that data.</p>
+ </li>
+
<li id="M201711230">
- <p>AI-powered driving apps can <a
-
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p>
</li>
<li id="M201709290">
- <p>Bad security</em></ins></span> in <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>some cars makes it possible to <a
+ <p>Bad security in some cars makes it possible to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
remotely activate the airbags</a>.</p>
</li>
<li id="M201709091">
- <p>Tesla used</em></ins></span> software to limit <span
class="removed"><del><strong>customers to
-using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"></strong></del></span>
<span class="inserted"><ins><em>the</em></ins></span> part of the battery
<span class="removed"><del><strong>of</strong></del></span>
+ <p>Tesla used software to limit the</em></ins></span> part of the
battery <span class="removed"><del><strong>of</strong></del></span>
<span class="inserted"><ins><em>that was available to customers
in</em></ins></span> some <span
class="removed"><del><strong>cars</a>.</p></strong></del></span>
<span class="inserted"><ins><em>cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
a universal back door in the software</a> to temporarily increase
@@ -340,7 +358,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/26 06:58:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-cars.de.po 25 Oct 2018 10:31:08 -0000 1.11
+++ malware-cars.de.po 26 Oct 2018 06:58:57 -0000 1.12
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -84,6 +84,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
"article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
"your every move</a>."
Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-cars.fr.po 25 Oct 2018 10:58:25 -0000 1.16
+++ malware-cars.fr.po 26 Oct 2018 06:58:57 -0000 1.17
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-10-25 12:57+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -80,6 +81,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
"article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
"your every move</a>."
Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- malware-cars.pot 25 Oct 2018 10:31:08 -0000 1.7
+++ malware-cars.pot 26 Oct 2018 06:58:57 -0000 1.8
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell "
+"phones. <em>All</em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a "
"href=\"https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\">
"
"track your every move</a>."
Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-cars.ru.po 25 Oct 2018 17:00:14 -0000 1.20
+++ malware-cars.ru.po 26 Oct 2018 06:58:57 -0000 1.21
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-09-20 04:21-0500\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -82,6 +83,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
"article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
"your every move</a>."
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- proprietary-surveillance.de.po 25 Oct 2018 17:58:25 -0000 1.237
+++ proprietary-surveillance.de.po 26 Oct 2018 06:58:57 -0000 1.238
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -3741,6 +3741,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
"article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
"your every move</a>."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- proprietary-surveillance.fr.po 25 Oct 2018 18:54:51 -0000 1.329
+++ proprietary-surveillance.fr.po 26 Oct 2018 06:58:57 -0000 1.330
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-10-25 20:53+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3054,6 +3055,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
"article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
"your every move</a>."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-surveillance.it-diff.html 25 Oct 2018 17:58:26 -0000
1.78
+++ proprietary-surveillance.it-diff.html 26 Oct 2018 06:58:57 -0000
1.79
@@ -1355,7 +1355,7 @@
<p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>design
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
the app to snoop at all</a>.</p>
</li>
@@ -1545,9 +1545,12 @@
<li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+ href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>100 <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+ and advertising</a> URLs,</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware</strong></del></span> <span
class="inserted"><ins><em>the average.</p>
</li>
<li id="M201504060">
@@ -1566,7 +1569,7 @@
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
+ is doing this in a way that</em></ins></span> at <span
class="removed"><del><strong>Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>least is visible and optional</a>. Not
as bad as what the others do.</p>
</li>
@@ -1606,11 +1609,12 @@
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<ul class="blurbs">
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201307110">
<p>Skype contains <a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
@@ -1618,28 +1622,33 @@
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInGames">Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers</em></ins></span> and <span
class="inserted"><ins><em>sends it to third parties</a>.</p>
</li>
<li id="M201804144">
- <p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
+ <p>ArenaNet surreptitiously installed a</em></ins></span> spyware
<span class="removed"><del><strong>via BIOS</a></strong></del></span>
+ <span class="inserted"><ins><em>program along with an update to the massive
multiplayer game Guild War 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ to snoop</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>all open processes
running on its user's computer</a>.</p>
</li>
<li id="M201711070">
@@ -1664,12 +1673,14 @@
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
+ <p>Even nastier, they do it through ad networks</em></ins></span>
that <span class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>data
collected by various cr…apps and sites made by different
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
+ “whales” who can be led to spend</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>lot of
money. They also
use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
@@ -1691,8 +1702,14 @@
<li id="M200510200">
<p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's computer and
sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
@@ -1702,130 +1719,48 @@
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
-
- <p>Don't be a sucker—reject all the stings.</p>
-
- <p>It is unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
- </li>
-</ul></em></ins></span>
-
-
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
-</div>
-
<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul class="blurbs">
- <li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
-
- <p>We link to the article for the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
- </li>
-
- <li id="M201702060">
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
- </li>
-
- <li id="M201511130">
- <p>Some web and TV advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
- are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web
activity,</em></ins></span> and <span class="removed"><del><strong>spyware via
BIOS</a> on Windows installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since</strong></del></span> <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
- </li>
-
- <li id="M201511060">
- <p>Vizio goes a step further than other TV
- manufacturers</em></ins></span> in <span class="removed"><del><strong>its
own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>spying</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
<li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>their
users: their</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers</em></ins></span>
can <span class="removed"><del><strong>collect the emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
- across devices.</p>
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
- <p>It is possible to turn</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>off, but having</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>people that use them</a>.</p>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>enabled by default
- is an injustice already.</p></em></ins></span>
+ <p>Don't be a sucker—reject all the stings.</p>
+
+ <p>It is unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
- already monitors. Tivo customers are unaware they're
- being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
</ul>
@@ -1834,12 +1769,12 @@
<!-- #SpywareOnTheRoad -->
<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span
class="removed"><del><strong>place</strong></del></span> new <span
class="removed"><del><strong>items on top under each subsection -->
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>me and
+said, “Didn't I see you</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -1851,47 +1786,79 @@
<ul>
<li>
- <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>combined surveillance by default.</p>
+ <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs.</p>
+
+<ul class="blurbs">
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
+
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>“off.”</p>
+ <p>A</strong></del></span> <span class="inserted"><ins><em>presents.
It
+ is too bad that the article finishes by advocating the
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
- <li id="M201507240">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs recognize and</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are</em></ins></span> watching</a>, even <span
class="removed"><del><strong>when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is
using</strong></del></span> <span
class="inserted"><ins><em>if</em></ins></span> it <span
class="removed"><del><strong>to outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>isn't a TV channel.</p></em></ins></span>
+ <li id="M201702060">
+ <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>device means</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>coming from the user's own computer,
+ the TV reports what</em></ins></span> it <span
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"></em></ins></span>
- snoops on <span class="removed"><del><strong>readers</a>.</p>
+ <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>contain Javascript code,</strong></del></span>
<span class="inserted"><ins><em>correlate ads with Web
activity,</em></ins></span> and <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li><p>Spyware in many e-readers—not only the
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only the
Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report</strong></del></span> <span class="inserted"><ins><em>what
programs people watch, and</em></ins></span> even <span
class="removed"><del><strong>which page the user reads at</strong></del></span>
what <span class="removed"><del><strong>time</a>.</p>
+ they report even which page the user reads at what
time</a>.</p>
</li>
<li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>they
wanted</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ needed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ is an injustice already.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
<h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
@@ -1899,118 +1866,141 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+<li><p>Computerized cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>nonfree software</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers</em></ins></span> are <span
class="inserted"><ins><em>unaware they're
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
+ anyone</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
+ record</a>.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
- users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident</strong></del></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software in the car is
- proprietary,</strong></del></span> <span class="inserted"><ins><em>when
first sold.</p>
+ users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> when
+ <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>first sold.</p>
</li>
<li id="M201502090">
- <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>and would then have</em></ins></span> to <span
class="removed"><del><strong>the car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>US or some
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
+ Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless</em></ins></span>
it is <span class="removed"><del><strong>possible to physically remove the cell
phone modem
- though.</p>
- </li>
-
- <li id="records-drivers"><p>Proprietary</strong></del></span>
<span class="inserted"><ins><em>done by free</em></ins></span>
- software in <span class="removed"><del><strong>cars</strong></del></span>
<span class="inserted"><ins><em>your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
- <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive</em></ins></span> information <span
class="removed"><del><strong>about drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>will be transmitted</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p></strong></del></span> <span
class="inserted"><ins><em>third
+ <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>trusted
unless it is done by free</em></ins></span>
+ software in <span class="removed"><del><strong>the
car</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
- <li id="M201411090"></em></ins></span>
- <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article,</strong></del></span> <span
class="inserted"><ins><em>Amazon “Smart” TV</em></ins></span> is
<span class="removed"><del><strong>not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
<li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ on their</em></ins></span> users</a>.</p>
- <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
- payment systems,</strong></del></span> <span
class="inserted"><ins><em>2014,</em></ins></span> but <span
class="removed"><del><strong>the invasion isn't done by malware. The other
- cases mentioned</strong></del></span> <span class="inserted"><ins><em>we
don't expect this has got
- better.</p>
+ <span class="removed"><del><strong><p>Even if no one
connects</strong></del></span>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car.</p></li>
+ <span class="inserted"><ins><em><p>The report was as of 2014, but we
don't expect this has got
+ better.</p>
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ <p>This shows that laws requiring products</em></ins></span> to
<span class="inserted"><ins><em>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the <span class="removed"><del><strong>car's location at
any time. (See</strong></del></span>
- <span class="inserted"><ins><em>user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>physically remove</strong></del></span>
<span class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span>
+ <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
</li>
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software</strong></del></span> <span
class="inserted"><ins><em>id="M201405200">
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span> <span
class="inserted"><ins><em>LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available to car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware in the
car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store</strong></del></span> <span class="inserted"><ins><em>the switch
to turn</em></ins></span> this <span class="removed"><del><strong>information,
but if</strong></del></span> <span class="inserted"><ins><em>off has
- no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
+ reports what</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>user
watches,</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store</strong></del></span> <span class="inserted"><ins><em>switch to
turn</em></ins></span> this <span class="removed"><del><strong>information, but
if</strong></del></span> <span class="inserted"><ins><em>off has
+ no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
+ really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data
+ <span class="removed"><del><strong>and hand</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
- <p>Even worse, it <a
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
- <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ do lots of spying anyway</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201212170">
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a></em></ins></span>
- and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the
<span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>people who
are watching TV.</p></em></ins></span>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>a
“smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
-</ul>
-
-
-<span class="removed"><del><strong><!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+</ul></em></ins></span>
<div <span class="removed"><del><strong>class="big-section">
@@ -2163,27 +2153,24 @@
<p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="inserted"><ins><em>i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span> <span class="inserted"><ins><em>speech
recognition
+ conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p></strong></del></span>
<span class="inserted"><ins><em>speech recognition
company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ crackers to listen in on a child's speech, and even speak into the
+ toys themselves.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>would then have</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ going to spy on children</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2194,9 +2181,9 @@
<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>the internet</strong></del></span>
<span class="inserted"><ins><em>you</a>.</p>
</li>
</ul>
@@ -2207,18 +2194,19 @@
<ul class="blurbs">
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
+ and <span class="removed"><del><strong>would then have to
+ give</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
<p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the US
- <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span>
or <span class="removed"><del><strong>some other government.</p>
- <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>cease</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done
- by free software</strong></del></span> <span
class="inserted"><ins><em>sell the product</em></ins></span> in <span
class="removed"><del><strong>your own computer.</p>
+ easier for Amazon. And if some government such as China
or</em></ins></span> the US <span class="removed"><del><strong>or some other
government.</p>
+ <p>Speech recognition is not to be trusted unless it is done
+ by free software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span> that <span class="inserted"><ins><em>country,
+ <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span>
+ <span class="inserted"><ins><em>told Amazon to do this, or cease to sell
the product in</em></ins></span> that <span class="inserted"><ins><em>country,
do you think Amazon would have the moral fiber to say no?</p>
<p>These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
@@ -2247,22 +2235,28 @@
<p>Today's technological practice does not include any way of making
a device</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>can obey your voice commands without potentially
spying
- on you. Even if</em></ins></span> it <span class="inserted"><ins><em>is
air-gapped, it could be saving up records
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices</strong></del></span> <span
class="inserted"><ins><em>can obey your voice commands without potentially
spying</em></ins></span>
+ on <span class="removed"><del><strong>the user's local
network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped,</em></ins></span> it
<span class="removed"><del><strong>had installed a patch to stop this, but any
product</strong></del></span> could <span class="removed"><del><strong>spy this
way.</p>
+
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>be saving up records
about you for later examination.</p>
</li>
<li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
- data about the user</a>.</p>
- </li>
-
- <li id="M201310260">
- <p><a
-
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="inserted"><ins><em>their renters</a>.</p>
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>data about the
user</a>.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201310260"></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>what programs</strong></del></span> <span
class="inserted"><ins><em>their renters</a>.</p>
</li>
</ul>
@@ -2276,12 +2270,10 @@
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often people wear it</a>.</p>
-
- <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+ monitor how often</em></ins></span> people <span
class="removed"><del><strong>watch, and even</strong></del></span> <span
class="inserted"><ins><em>wear it</a>.</p>
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>sheeple to find</em></ins></span> it <span
class="removed"><del><strong>had installed a patch</strong></del></span> <span
class="inserted"><ins><em>normal that companies
- monitor every aspect of what they do.</p>
+ <p>This will teach the sheeple to find it normal that companies
+ monitor every aspect of</em></ins></span> what they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
</ul>
@@ -2292,21 +2284,16 @@
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</em></ins></span> to <span class="removed"><del><strong>stop
this,</strong></del></span> <span class="inserted"><ins><em>an unidentified
site in China</a>.</p>
-
- <p>The article says this is a back door,</em></ins></span> but <span
class="removed"><del><strong>any product</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> could <span
class="removed"><del><strong>spy this way.</p>
+ that connects to an unidentified site in China</a>.</p>
- <p>Meanwhile,</strong></del></span> <span
class="inserted"><ins><em>be a
+ <p>The article says this is a back door, but that could be a
misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
<li id="M201407090">
- <p>An</em></ins></span> LG <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>“smart” watch is
designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
- </li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else</em></ins></span> and <span
class="removed"><del><strong>even what they wanted</strong></del></span> to
<span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>transmit conversations
+ <p>An LG “smart” watch is designed <a
+
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
+ to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>report its location to someone else and to
transmit conversations
too</a>.</p></em></ins></span>
</li>
</ul>
@@ -2322,52 +2309,69 @@
<span class="removed"><del><strong><div style="clear: left;"></div>
<ul>
-<li><p>Users</strong></del></span>
+<li><p>Users are suing Bose for</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711230">
- <p>AI-powered driving apps can <a
-
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ <li id="M201810230">
+ <p>GM</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing a spyware app for its headphones</a>.
+Specifically, the app would record</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>choices</em></ins></span> of <span
class="removed"><del><strong>the audio files
+users listen to along with the headphone's unique serial number.
+</p>
+
+<p>The suit accuses that this was done without the</strong></del></span>
<span class="inserted"><ins><em>radio programs</a> in its
+ “connected” cars, minute by minute.</p>
+
+ <p>GM did not get</em></ins></span> users' <span
class="removed"><del><strong>consent.
+If the fine print of</strong></del></span> <span
class="inserted"><ins><em>consent, but it could have got that easily by
+ sneaking it into</em></ins></span> the <span
class="removed"><del><strong>app said</strong></del></span> <span
class="inserted"><ins><em>contract</em></ins></span> that users <span
class="removed"><del><strong>gave consent</strong></del></span> <span
class="inserted"><ins><em>sign</em></ins></span> for <span
class="removed"><del><strong>this,
+would that make it acceptable? No way! It</strong></del></span> <span
class="inserted"><ins><em>some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection</em></ins></span>
should be <span class="removed"><del><strong>flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
+
+ <p>But if you really want</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure</em></ins></span> the
<span class="removed"><del><strong>app to snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>car's
+ hardware cannot collect any of that data.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711230">
+ <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p>
</li>
<li id="M201607160">
- <p>Computerized cars with nonfree software</em></ins></span> are
<span class="removed"><del><strong>suing Bose for</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ <p>Computerized cars with nonfree software are <a
+
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
<li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
+ <p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
-Specifically, the app would record the names of the audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
+ access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
-</p>
-
-<p>The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>do
because</em></ins></span> the <span class="removed"><del><strong>fine print
of</strong></del></span> <span class="inserted"><ins><em>system has no
authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>modem.
However, even if</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It
should</strong></del></span> <span class="inserted"><ins><em>asked
- for authentication, you couldn't</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>confident that Nissan
- has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in the car is proprietary, <a
+ href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
-</p>
-</li>
-
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the
cell phone modem
+ <p>Even if no one connects to the car remotely, the cell phone modem
enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track the car's movements all</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
@@ -2770,7 +2774,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 17:58:26 $
+$Date: 2018/10/26 06:58:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- proprietary-surveillance.it.po 25 Oct 2018 17:58:26 -0000 1.250
+++ proprietary-surveillance.it.po 26 Oct 2018 06:58:57 -0000 1.251
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3440,6 +3440,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
"article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
"your every move</a>."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary-surveillance.ja-diff.html 25 Oct 2018 17:58:26 -0000
1.89
+++ proprietary-surveillance.ja-diff.html 26 Oct 2018 06:58:57 -0000
1.90
@@ -1302,159 +1302,82 @@
</div>
<ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
+ <li><p>Spyware in Skype:</strong></del></span>
<span class="inserted"><ins><em><li id="M201701210">
- <p>The Meitu photo-editing app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+ <p>The Meitu photo-editing app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>a Chinese
company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
- <li id="M201611280"></em></ins></span>
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is</strong></del></span> <span
class="inserted"><ins><em>Uber app tracks</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
+ <li id="M201611280">
+ <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ movements before and after the ride</a>.</p>
- <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user's
- consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>using it to outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>inadequate as a protection against
+ <p>This example illustrates how “getting the user's
+ consent”</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>surveillance is inadequate as a protection
against
massive surveillance.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
- <li><p>Spyware in many e-readers—not only the
- Kindle:</strong></del></span>
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
<span class="inserted"><ins><em><li id="M201611160">
- <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span>
- <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>privacy
and security of
- 283 Android VPN apps concluded that “in spite of</em></ins></span>
the <span class="removed"><del><strong>e-reader used</strong></del></span>
<span class="inserted"><ins><em>promises
- for privacy, security, and anonymity given</em></ins></span> by <span
class="removed"><del><strong>most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span> <span class="inserted"><ins><em>the
majority</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>VPN
- apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
+ <p>A <a
+
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security, and anonymity given by the majority of VPN
+ apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>poor security
+<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>infringe their
+ <p>Following is a non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>do because
the system has no authentication when
- accessed through the modem. However, even if</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
+ meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that
Nissan</strong></del></span> has <span class="removed"><del><strong>no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>full access to users'
+ permissions upon installation, meaning it has full access to users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong>demands blind faith from its
users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>stores detailed logs and
- may turn them over</em></ins></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>UK
government if requested.</dd>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>HTML pages returned</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span>
- <span class="inserted"><ins><em>users. The stated purpose
of</em></ins></span> the <span class="removed"><del><strong>time;
it</strong></del></span> <span class="inserted"><ins><em>JS
injection</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
- roughly five tracking libraries. Also, it redirects</em></ins></span>
the <span class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
-
- <li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>user's
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection is to display ads. Uses
+ roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>also uses roughly
- five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned
in</strong></del></span> this <span class="removed"><del><strong>article, is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>app have confirmed that
- the non-premium version</em></ins></span> of <span
class="removed"><del><strong>privacy,</strong></del></span> <span
class="inserted"><ins><em>the app does JavaScript injection for
- tracking the user</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
</dl>
</li>
@@ -1468,23 +1391,16 @@
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>picture you take according to who
is</em></ins></span>
- in the <span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+ and suggests you to share the picture you take according to who is
+ in the frame.</p>
<p>This spyware feature seems to require online access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>be
- sent across</em></ins></span> the <span class="removed"><del><strong>car's
location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and
<span class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but</strong></del></span> <span
class="inserted"><ins><em>face-recognition
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even</em></ins></span> if the <span class="removed"><del><strong>state
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't
“upload” them</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> the <span
class="inserted"><ins><em>service.</p>
+ even if the user didn't “upload” them to the service.</p>
</li>
<li id="M201605310">
@@ -1498,104 +1414,53 @@
<li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of</em></ins></span> data <span
class="inserted"><ins><em>in the phone,</em></ins></span> and <span
class="removed"><del><strong>hand</strong></del></span> <span
class="inserted"><ins><em>in server accounts,</em></ins></span>
- it <span class="removed"><del><strong>over, the
state</strong></del></span> can <span class="removed"><del><strong>store
it.</p></strong></del></span> <span class="inserted"><ins><em>alter them
too</a>.</p></em></ins></span>
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span class="inserted"><ins><em><li id="M201601130">
+ <li id="M201601130">
<p>Apps that include <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</strong></del></span> <span
class="inserted"><ins><em>what radio and TV programs
- are playing nearby</a>. Also</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>what users post on various sites
- such as Facebook, Google+ and Twitter.</p></em></ins></span>
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-<p>Emo Phillips made a joke: The other day a woman came
up</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
+ <li id="M201511190">
<p>“Cryptic communication,”
- unrelated</em></ins></span> to <span class="removed"><del><strong>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently
that</strong></del></span> <span class="inserted"><ins><em>app's
functionality,</em></ins></span> was
-<span class="removed"><del><strong>before Amazon “smart”
TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <a <span class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android
apps</a>.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>report
was</strong></del></span> <span class="inserted"><ins><em>article should not
have described these apps</em></ins></span> as <span
class="removed"><del><strong>of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</strong></del></span>
- <span
class="inserted"><ins><em>“free”—they</em></ins></span> are
<span class="removed"><del><strong>totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV
will</strong></del></span> not <span
class="removed"><del><strong>work.”</p>
-
- <p>Proper laws would</strong></del></span> <span
class="inserted"><ins><em>free software. The clear way
- to</em></ins></span> say <span class="inserted"><ins><em>“zero
price” is “gratis.”</p>
-
- <p>The article takes for granted</em></ins></span> that <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>the usual analytics tools</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span>
- <span class="inserted"><ins><em>legitimate, but is that valid? Software
developers have no right</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span>
- <span class="inserted"><ins><em>analyze</em></ins></span> what
- <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other
snooping.</p></em></ins></span>
+ unrelated to the app's functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way
+ to say “zero price” is “gratis.”</p>
+
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools
+ that snoop are just as wrong as any other snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510300">
- <p>More</em></ins></span> than <span
class="removed"><del><strong>other TV manufacturers in spying on
- their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>73%</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
- across devices.</p>
- <p>It</strong></del></span> <span class="inserted"><ins><em>47% of
mobile applications, from Android and iOS
+ <li id="M201510300">
+ <p>More than 73% and 47% of mobile applications, from Android and iOS
respectively <a href="https://techscience.org/a/2015103001/">share
personal, behavioral and location information</a> of their users with
third parties.</p>
</li>
<li id="M201508210">
- <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span
class="removed"><del><strong>possible</strong></del></span>
- <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015 it <a
+ <p>Like most “music screaming” disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having</strong></del></span>
<span class="inserted"><ins><em>increased snooping</a>, and some are
starting
- to realize that</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
+ demanded users submit to increased snooping</a>, and some are
starting
+ to realize that it is nasty.</p>
<p>This article shows the <a
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</em></ins></span> to
<span class="inserted"><ins><em>“serve”
+ twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example of</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>attitude
of</em></ins></span> the <span class="removed"><del><strong>company already
- monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>proprietary software industry
+ typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -1609,31 +1474,24 @@
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>not in fact</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>. It also uses the
+ “free”, but most of them are not in fact <a
+ href="/philosophy/free-sw.html">free software</a>. It also uses
the
ugly word “monetize”. A good replacement for that word
is “exploit”; nearly always that will fit perfectly.</p>
</li>
<li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>100 <a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>TV advertisements play inaudible
sounds to be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs,</em></ins></span> on
<span class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>the average.</p>
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
</li>
<li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This
is</em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>addition</em></ins></span> to <span
class="removed"><del><strong>determine that they are
nearby.</strong></del></span>
- <span class="inserted"><ins><em>the snooping done by the phone company,
and perhaps by the OS in
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
the phone.</p>
<p>Don't be distracted by the question of whether the app developers
@@ -1837,8 +1695,7 @@
<p>Some web and TV advertisements play inaudible
sounds to be picked up by proprietary malware running
on other devices in range so as to determine that they
- are nearby.</em></ins></span> Once your
- <span class="removed"><del><strong>Internet
devices</strong></del></span> <span class="inserted"><ins><em>Internet devices
are paired with
+ are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
@@ -1918,10 +1775,9 @@
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>paired with</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
+ consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without</em></ins></span> your <span
class="removed"><del><strong>TV, advertisers can
- correlate ads with Web activity,</strong></del></span> <span
class="inserted"><ins><em>consent to tracking, the TV will not
+ say, “Without your consent to tracking, the TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
@@ -1950,28 +1806,29 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a></em></ins></span>
- and
- <span class="removed"><del><strong>other</strong></del></span> <span
class="inserted"><ins><em>use its camera to watch the people who are watching
TV.</p>
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <span class="inserted"><ins><em><li id="M201511250">
- <p>The Nest Cam</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>camera is <a
+ <li id="M201511250"></em></ins></span>
+ <p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
@@ -1982,110 +1839,196 @@
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
- </li>
-
- <li id="M201711100">
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
- </li>
-
- <li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
+ into one.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>the conversation between two
users</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140">
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was</em></ins></span> snooping <span
class="removed"><del><strong>devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> its <span
class="removed"><del><strong>computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication when
+ accessed</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users could have
checked</em></ins></span>
- and <span class="inserted"><ins><em>changed.</p>
+ products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
+ and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
+ true, but</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
+ the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span class="inserted"><ins><em>its
customers.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
<span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
- manufacturer's snooping.</p>
+ Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow the company to extract data remotely and
+ determine</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>FBI could listen to these
- conversations was unacceptable by itself.</p></em></ins></span>
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>.</strong></del></span> Nuance <span
class="inserted"><ins><em>Communications</a>, a speech recognition
- company based in the U.S.</p>
+ <li id="M201612060">
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>save it and</strong></del></span>
<span class="inserted"><ins><em>remotely control the toys with a mobile phone.
This</em></ins></span> would <span class="removed"><del><strong>then have to
- give it</strong></del></span> <span class="inserted"><ins><em>enable
- crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>US or some other government.</p>
- <p>Speech recognition is not</strong></del></span>
- <span class="inserted"><ins><em>toys themselves.</p>
+ can <span class="removed"><del><strong>store it.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>a child's speech, and even speak into the
+ toys themselves.</p>
</li>
<li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in your own computer.</p></strong></del></span>
<span class="inserted"><ins><em>spy on children and
adults</a>.</p></em></ins></span>
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is</em></ins></span> in <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in
many cases</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>their users</a>.</p>
+
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
+ not work.”</p>
+
+ <p>Proper laws would say that TVs are not allowed to report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>you</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2094,58 +2037,77 @@
<ul class="blurbs">
<li id="M201808120">
- <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>user watches,</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
- and
- <span class="removed"><del><strong>the switch to</strong></del></span>
<span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"></em></ins></span>
- turn <span class="removed"><del><strong>this off has no effect. (The fact
that the
- transmission reports</strong></del></span> <span
class="inserted"><ins><em>it into</em></ins></span> a <span
class="removed"><del><strong>404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>listening
device</a> for them.</p>
-
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>server
- could save</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>data anyway.)</p>
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
+ their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but having it enabled by
default
+ is an injustice already.</p>
+ </li>
- <p>Even worse, it</strong></del></span> <span
class="inserted"><ins><em>country,
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>600 millions social media profiles the company
already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+ and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+
+ <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would</em></ins></span> be
+ <span class="removed"><del><strong>picked up by proprietary malware
running on other devices in
+ range so</strong></del></span> <span class="inserted"><ins><em>much
+ easier for Amazon. And if some government such</em></ins></span> as <span
class="inserted"><ins><em>China or the US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell the product
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.
Once your
+ Internet devices</strong></del></span> <span
class="inserted"><ins><em>country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers are probably hackers too, but please <a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>probably
hackers too, but please</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking” to mean “breaking
security”</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
- <li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"></strong></del></span>
+ <span class="inserted"><ins><em><li id="M201804140">
+ <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
<span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that</em></ins></span> snoops on
<span class="removed"><del><strong>other devices on</strong></del></span> <span
class="inserted"><ins><em>its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
-
- <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>Internet</a>.</p>
+ offers</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span class="inserted"><ins><em>gratis
electronic toothbrush that snoops on its user by
+ sending usage data back over the
Internet</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201706204">
- <p>Lots of “smart” products are designed <a
-
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>stop this,
but</strong></del></span> <span class="inserted"><ins><em>everyone in the
house, all the time</a>.</p>
-
- <p>Today's technological practice does not include</em></ins></span>
any <span class="removed"><del><strong>product</strong></del></span> <span
class="inserted"><ins><em>way of making
- a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it</em></ins></span> could <span
class="removed"><del><strong>spy this way.</p>
-
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>be saving up records
+ <span class="inserted"><ins><em><li id="M201706204">
+ <p>Lots of “smart” products are
designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in the house,</em></ins></span> all the
time</a>.</p>
+ <span class="removed"><del><strong></li>
+ <li><p>The Samsung “Smart” TV
+ <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users'</strong></del></span>
+
+ <span class="inserted"><ins><em><p>Today's technological practice
does not include any way of making
+ a device that can obey your</em></ins></span> voice <span
class="inserted"><ins><em>commands without potentially spying</em></ins></span>
+ on <span class="inserted"><ins><em>you. Even if it is air-gapped, it
could be saving up records
about you for later examination.</p>
</li>
<li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>data about the
user</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201310260"></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>what programs</strong></del></span> <span
class="inserted"><ins><em>their renters</a>.</p>
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>user</a>.</p>
+ </li>
+
+ <li id="M201310260">
+ <p><a
+
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save it and would then
have</strong></del></span> <span class="inserted"><ins><em>spy on their
renters</a>.</p>
</li>
</ul>
@@ -2159,10 +2121,11 @@
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often</em></ins></span> people <span
class="removed"><del><strong>watch, and even</strong></del></span> <span
class="inserted"><ins><em>wear it</a>.</p>
+ monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
- monitor every aspect of</em></ins></span> what they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ <p>This will teach the sheeple</em></ins></span> to
+ <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="inserted"><ins><em>normal that companies
+ monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2173,35 +2136,64 @@
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects to an unidentified site in China</a>.</p>
+ that connects</em></ins></span> to <span class="removed"><del><strong>the
US or some other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>not to</strong></del></span> <span
class="inserted"><ins><em>a back door, but that could</em></ins></span> be
<span class="removed"><del><strong>trusted unless</strong></del></span> <span
class="inserted"><ins><em>a
+ misunderstanding. However,</em></ins></span> it is <span
class="removed"><del><strong>done
+ by free software in your own computer.</p></strong></del></span>
<span class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"></strong></del></span>
- <li id="M201407090">
- <p>An LG “smart” watch is designed <a
+ <span class="inserted"><ins><em><li id="M201407090">
+ <p>An</em></ins></span> LG “smart” <span
class="removed"><del><strong>TVs</a> reports what the user
watches,</strong></del></span> <span class="inserted"><ins><em>watch is
designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>someone else and to transmit conversations
- too</a>.</p></em></ins></span>
+ to report its location to someone else</em></ins></span> and
+ <span class="removed"><del><strong>the switch</strong></del></span> to
<span class="removed"><del><strong>turn this off has no effect. (The fact that
the
+ transmission reports a 404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>transmit
conversations
+ too</a>.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInVehicles">Vehicles</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p>Many</strong></del></span>
+<ul class="blurbs">
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked</em></ins></span> the <span
class="removed"><del><strong>server</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711230">
+ <p>GM did not get users' consent, but it</em></ins></span> could
<span class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>have got</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
+
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>easily by
+ sneaking</em></ins></span> it
+ <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>contract that users sign for some digital
service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>stop this,
but</strong></del></span> <span class="inserted"><ins><em>you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect</em></ins></span> any <span
class="removed"><del><strong>product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
track your every move</a>.</p>
@@ -2217,10 +2209,22 @@
<p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely and make changes in various
+ access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>even what they wanted</strong></del></span> <span
class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication
+ <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>record.</a></p>
+ </li>
+</ul>
+
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
when accessed through the modem. However, even if it asked
for authentication, you couldn't be confident that Nissan
has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
@@ -2630,7 +2634,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 17:58:26 $
+$Date: 2018/10/26 06:58:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.223
retrieving revision 1.224
diff -u -b -r1.223 -r1.224
--- proprietary-surveillance.ja.po 25 Oct 2018 17:58:26 -0000 1.223
+++ proprietary-surveillance.ja.po 26 Oct 2018 06:58:57 -0000 1.224
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -2914,6 +2914,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
"article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
"your every move</a>."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary-surveillance.pot 25 Oct 2018 17:58:26 -0000 1.172
+++ proprietary-surveillance.pot 26 Oct 2018 06:58:57 -0000 1.173
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2107,6 +2107,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell "
+"phones. <em>All</em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a "
"href=\"https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\">
"
"track your every move</a>."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.416
retrieving revision 1.417
diff -u -b -r1.416 -r1.417
--- proprietary-surveillance.ru.po 25 Oct 2018 17:58:26 -0000 1.416
+++ proprietary-surveillance.ru.po 26 Oct 2018 06:58:57 -0000 1.417
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-25 17:56+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-10-05 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -3023,6 +3023,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
"article/43nz9p/ai-powered-driving-apps-can-track-your-every-move\"> track "
"your every move</a>."
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary.de.po 22 Oct 2018 10:28:25 -0000 1.57
+++ proprietary.de.po 26 Oct 2018 06:58:57 -0000 1.58
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -98,9 +98,9 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <p>
-# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+339+} instances of malicious
-# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | As of [-April, 2017,-] {+October 26, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+340+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 404 references to back them
# | up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -108,8 +108,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
@@ -423,6 +423,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.es.po 22 Oct 2018 10:28:25 -0000 1.56
+++ proprietary.es.po 26 Oct 2018 06:58:57 -0000 1.57
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-09-19 10:49+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -92,9 +92,9 @@
"de ser engañado."
#. type: Content of: <p>
-# | As of [-September,-] {+October 22,+} 2018, the [-files-] {+pages+} in this
-# | directory list [-around 400-] {+339+} instances of malicious
-# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | As of [-September,-] {+October 26,+} 2018, the [-files-] {+pages+} in this
+# | directory list [-around 400-] {+340+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 404 references to back them
# | up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -102,8 +102,8 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"Hasta septiembre de 2018, los archivos de este directorio ofrecÃan una lista
"
@@ -436,6 +436,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.fr.po 22 Oct 2018 15:37:19 -0000 1.65
+++ proprietary.fr.po 26 Oct 2018 06:58:57 -0000 1.66
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-10-22 17:36+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -86,9 +87,18 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <p>
+# | As of October 2[-2-]{+6+}, 2018, the pages in this directory list [-339-]
+# | {+340+} instances of malicious functionalities (with 40[-3-]{+4+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of October 22, 2018, the pages in this directory list 339 instances of "
+#| "malicious functionalities (with 403 references to back them up), but "
+#| "there are surely thousands more we don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"Le 22 octobre 2018, les pages de ce répertoire dénombraient 339 cas de "
@@ -290,6 +300,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary.it-diff.html 22 Oct 2018 10:28:25 -0000 1.15
+++ proprietary.it-diff.html 26 Oct 2018 06:58:57 -0000 1.16
@@ -25,9 +25,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -43,12 +43,12 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em;</em></ins></span> }
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
40em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -81,8 +81,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October 22,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 300</strong></del></span> <span
class="inserted"><ins><em>339</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 403 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October 26,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 300</strong></del></span> <span
class="inserted"><ins><em>340</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 404 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -154,10 +154,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -179,6 +179,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
+
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data.</p>
+ </li>
+
<li id="M201810150">
<p>Printer manufacturers are very innovative—at blocking the
use of independent replacement ink cartridges. Their “security
@@ -292,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/22 10:28:25 $
+$Date: 2018/10/26 06:58:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.it.po 22 Oct 2018 10:28:25 -0000 1.66
+++ proprietary.it.po 26 Oct 2018 06:58:57 -0000 1.67
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -94,9 +94,9 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <p>
-# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+339+} instances of malicious
-# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | As of [-April, 2017,-] {+October 26, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+340+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 404 references to back them
# | up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -104,8 +104,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
@@ -427,6 +427,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary.ja-diff.html 22 Oct 2018 10:28:25 -0000 1.17
+++ proprietary.ja-diff.html 26 Oct 2018 06:58:57 -0000 1.18
@@ -40,8 +40,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -77,8 +77,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>October 22,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 260</strong></del></span> <span
class="inserted"><ins><em>339</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 403 references to
+<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>October 26,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 260</strong></del></span> <span
class="inserted"><ins><em>340</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 404 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -176,6 +176,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
+
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data.</p>
+ </li>
+
<li id="M201810150">
<p>Printer manufacturers are very innovative—at blocking the
use of independent replacement ink cartridges. Their “security
@@ -289,7 +307,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/22 10:28:25 $
+$Date: 2018/10/26 06:58:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary.ja.po 22 Oct 2018 10:28:25 -0000 1.49
+++ proprietary.ja.po 26 Oct 2018 06:58:57 -0000 1.50
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -95,8 +95,8 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
@@ -349,6 +349,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary.nl-diff.html 22 Oct 2018 10:28:25 -0000 1.15
+++ proprietary.nl-diff.html 26 Oct 2018 06:58:57 -0000 1.16
@@ -25,9 +25,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -43,12 +43,12 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em;</em></ins></span> }
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
40em;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
@@ -81,8 +81,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October 22,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 300</strong></del></span> <span
class="inserted"><ins><em>339</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 403 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October 26,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 300</strong></del></span> <span
class="inserted"><ins><em>340</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 404 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -179,6 +179,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
+
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data.</p>
+ </li>
+
<li id="M201810150">
<p>Printer manufacturers are very innovative—at blocking the
use of independent replacement ink cartridges. Their “security
@@ -292,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/22 10:28:25 $
+$Date: 2018/10/26 06:58:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary.nl.po 22 Oct 2018 10:28:26 -0000 1.39
+++ proprietary.nl.po 26 Oct 2018 06:58:57 -0000 1.40
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -96,9 +96,9 @@
"je meestal belazerd."
#. type: Content of: <p>
-# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+339+} instances of malicious
-# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | As of [-April, 2017,-] {+October 26, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+340+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 404 references to back them
# | up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
@@ -106,8 +106,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"Anno april 2017 staan er in dit overzicht ongeveer 300 gevallen van "
@@ -420,6 +420,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary.pl-diff.html 22 Oct 2018 10:28:26 -0000 1.33
+++ proprietary.pl-diff.html 26 Oct 2018 06:58:57 -0000 1.34
@@ -25,9 +25,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -85,8 +85,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October 22, 2018, the pages in this directory
list 339
-instances of malicious functionalities (with 403 references to
+<p>As of October 26, 2018, the pages in this directory list 340
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with 404 references
to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -124,15 +124,15 @@
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -153,10 +153,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -177,6 +177,24 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810230">
+ <p>GM <a
+ href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
+ tracked the choices of radio programs</a> in its
+ “connected” cars, minute by minute.</p>
+
+ <p>GM did not get users' consent, but it could have got that easily
by
+ sneaking it into the contract that users sign for some digital service
+ or other. A requirement for consent is effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data: listening to you,
+ watching you, following your movements, tracking passengers' cell
+ phones. <em>All</em> such data collection should be
forbidden.</p>
+
+ <p>But if you really want to be safe, we must make sure the car's
+ hardware cannot collect any of that data.</p>
+ </li>
+
<li id="M201810150">
<p>Printer manufacturers are very innovative—at blocking the
use of independent replacement ink cartridges. Their “security
@@ -290,7 +308,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/22 10:28:26 $
+$Date: 2018/10/26 06:58:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary.pl.po 22 Oct 2018 10:28:26 -0000 1.34
+++ proprietary.pl.po 26 Oct 2018 06:58:57 -0000 1.35
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -135,8 +135,8 @@
#. type: Content of: <p>
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
@@ -501,6 +501,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary.pot 22 Oct 2018 10:28:26 -0000 1.31
+++ proprietary.pot 26 Oct 2018 06:58:57 -0000 1.32
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -70,8 +70,8 @@
#. type: Content of: <p>
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
@@ -241,6 +241,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell "
+"phones. <em>All</em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a "
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary.pt-br.po 22 Oct 2018 16:58:56 -0000 1.16
+++ proprietary.pt-br.po 26 Oct 2018 06:58:57 -0000 1.17
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-10-22 13:22-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -84,9 +85,14 @@
"de ser mal."
#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "As of October 22, 2018, the pages in this directory list 339 instances of "
+#| "malicious functionalities (with 403 references to back them up), but "
+#| "there are surely thousands more we don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"Desde 22 de Outubro de 2018, as páginas neste diretório listam quase 339 "
@@ -288,6 +294,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary.ru.po 22 Oct 2018 15:58:35 -0000 1.85
+++ proprietary.ru.po 26 Oct 2018 06:58:57 -0000 1.86
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-10-22 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-26 06:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -88,9 +89,18 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <p>
+# | As of October 2[-2-]{+6+}, 2018, the pages in this directory list [-339-]
+# | {+340+} instances of malicious functionalities (with 40[-3-]{+4+}
+# | references to back them up), but there are surely thousands more we don't
+# | know about.
+#, fuzzy
+#| msgid ""
+#| "As of October 22, 2018, the pages in this directory list 339 instances of "
+#| "malicious functionalities (with 403 references to back them up), but "
+#| "there are surely thousands more we don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"Ðа окÑÑбÑÑ 2018 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено 339 "
@@ -294,6 +304,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary.zh-tw.po 22 Oct 2018 10:28:26 -0000 1.17
+++ proprietary.zh-tw.po 26 Oct 2018 06:58:57 -0000 1.18
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-22 10:25+0000\n"
+"POT-Creation-Date: 2018-10-26 06:55+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -92,8 +92,8 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October 22, 2018, the pages in this directory list 339 instances of "
-"malicious functionalities (with 403 references to back them up), but there "
+"As of October 26, 2018, the pages in this directory list 340 instances of "
+"malicious functionalities (with 404 references to back them up), but there "
"are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
@@ -338,6 +338,33 @@
#. type: Content of: <ul><li><p>
msgid ""
+"GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\"> "
+"tracked the choices of radio programs</a> in its “connected” "
+"cars, minute by minute."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"GM did not get users' consent, but it could have got that easily by sneaking "
+"it into the contract that users sign for some digital service or other. A "
+"requirement for consent is effectively no protection."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The cars can also collect lots of other data: listening to you, watching "
+"you, following your movements, tracking passengers' cell phones. <em>All</"
+"em> such data collection should be forbidden."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But if you really want to be safe, we must make sure the car's hardware "
+"cannot collect any of that data."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-cars.de-diff.html ma...,
GNUN <=