[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.fr.html malware-a...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.fr.html malware-a... |
Date: |
Sat, 27 Oct 2018 04:28:56 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/27 04:28:54
Modified files:
proprietary : malware-apple.fr.html malware-apple.ru.html
proprietary/po : malware-apple.de-diff.html
malware-apple.fr-en.html
malware-apple.it-diff.html
malware-apple.ja-diff.html
malware-apple.nl-diff.html
malware-apple.ru-en.html
malware-cars.de-diff.html malware-cars.de.po
malware-cars.fr.po malware-cars.pot
malware-cars.ru.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de.po proprietary.es.po
proprietary.fr.po proprietary.it-diff.html
proprietary.it.po proprietary.ja-diff.html
proprietary.ja.po proprietary.nl-diff.html
proprietary.nl.po proprietary.pl-diff.html
proprietary.pl.po proprietary.pot
proprietary.pt-br.po proprietary.ru.po
proprietary.zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.331&r2=1.332
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.419&r2=1.420
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.18&r2=1.19
Patches:
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-apple.fr.html 25 Oct 2018 11:28:56 -0000 1.65
+++ malware-apple.fr.html 27 Oct 2018 08:28:51 -0000 1.66
@@ -634,12 +634,6 @@
technique</a>.</p>
</li>
- <li id="M201405080">
- <p>Apple peut â et elle le fait régulièrement â <a
-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">extraire
-à distance certaines données des iPhones pour l'Ãtat</a>.</p>
- </li>
-
<li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">Le
@@ -781,7 +775,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/25 11:28:56 $
+$Date: 2018/10/27 08:28:51 $
<!-- timestamp end -->
</p>
Index: malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-apple.ru.html 25 Oct 2018 17:00:13 -0000 1.61
+++ malware-apple.ru.html 27 Oct 2018 08:28:51 -0000 1.62
@@ -624,12 +624,6 @@
ÑеÑ
ниÑеÑкий доклад</a>.</p>
</li>
- <li id="M201405080">
- <p>Apple Ð¼Ð¾Ð¶ÐµÑ <a
-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">извлекаÑÑ
-даннÑе Ñ ÑдаленнÑÑ
iPhone Ð´Ð»Ñ Ð³Ð¾ÑÑдаÑÑÑва</a> и
ÑегÑлÑÑно Ð´ÐµÐ»Ð°ÐµÑ ÑÑо.</p>
- </li>
-
<li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">ÑÑедÑÑво
@@ -768,7 +762,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/25 17:00:13 $
+$Date: 2018/10/27 08:28:51 $
<!-- timestamp end -->
</p>
Index: po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-apple.de-diff.html 25 Oct 2018 10:31:06 -0000 1.13
+++ po/malware-apple.de-diff.html 27 Oct 2018 08:28:52 -0000 1.14
@@ -437,340 +437,299 @@
censoring apps for the US government too</a>.
Specifically,</em></ins></span> it <span class="removed"><del><strong>still
counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage of this to
- <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>is
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>is
deleting apps developed by Iranians.</p>
- <p>The root</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends to Apple servers unsaved documents being
- edited</a>. The <a
-
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
- things you have not decided to save</strong></del></span> <span
class="inserted"><ins><em>these wrongs</em></ins></span> are <span
class="removed"><del><strong>even more sensitive than the
- things you have stored</strong></del></span> in <span
class="removed"><del><strong>files</a>.</p>
+ <p>The root</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>these wrongs are in Apple. If Apple had not designed
+ the iMonsters</em></ins></span> to <span class="inserted"><ins><em>let
Apple censor applications, Apple would not have
+ had the power to stop users from installing whatever kind of
apps.</p>
</li>
- <li><p>Apple has made various
- <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
- MacOS programs send files to</strong></del></span> <span
class="inserted"><ins><em>Apple. If</em></ins></span> Apple <span
class="removed"><del><strong>servers without asking permission</a>.
- This exposes</strong></del></span> <span class="inserted"><ins><em>had not
designed</em></ins></span>
- the <span class="removed"><del><strong>files to Big Brother and
perhaps</strong></del></span> <span
class="inserted"><ins><em>iMonsters</em></ins></span> to <span
class="removed"><del><strong>other snoops.</p>
-
- <p>It also demonstrates how you can't trust proprietary software,
- because even if today's version doesn't</strong></del></span> <span
class="inserted"><ins><em>let Apple censor applications, Apple would
not</em></ins></span> have <span class="removed"><del><strong>a malicious
- functionality, tomorrow's version might add it. The developer won't
- remove the malfeature unless many users push back hard,
and</strong></del></span>
- <span class="inserted"><ins><em>had</em></ins></span> the <span
class="inserted"><ins><em>power to stop</em></ins></span> users
- <span class="removed"><del><strong>can't remove it
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>from installing whatever kind of
apps.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201707290">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
- the latest MacOS send reports</strong></del></span>
+ <li id="M201707290">
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
deleted several VPNs from its app store for China</a>, thus using its
- own censorship power</em></ins></span> to <span
class="removed"><del><strong>Apple</a>
servers.</p></strong></del></span> <span
class="inserted"><ins><em>strengthen that of the Chinese
government.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Spyware in MacOS:
- <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701064">
- <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>Apple.</p>
+ own censorship power to strengthen that</em></ins></span> of <span
class="removed"><del><strong>many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>the Chinese
government.</p>
</li>
- <li><p>Apple admits the</strong></del></span> <span
class="inserted"><ins><em>enforce Russian surveillance</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
- by blocking distribution of the LinkedIn app</em></ins></span> in <span
class="inserted"><ins><em>Russia</a>.</p>
+ <li id="M201701064">
+ <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>break</strong></del></span> <span
class="inserted"><ins><em>enforce Russian surveillance <a
+
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ by blocking distribution of the LinkedIn app in Russia</a>.</p>
- <p>This is ironic because LinkedIn is</em></ins></span> a <span
class="removed"><del><strong>search facility</a>, but there's a lot
- <a href="https://github.com/fix-macosx/yosemite-phone-home">
- more snooping that Apple has not talked about</a>.</p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>surveillance system itself.
- While subjecting its users</em></ins></span> to <span
class="removed"><del><strong>exist for no possible
- purpose other than surveillance</a>. Here</strong></del></span> <span
class="inserted"><ins><em>its own surveillance, it tries to
+ <p>This is ironic because LinkedIn is a surveillance system itself.
+ While subjecting its users to its own surveillance, it tries to
protect its users from Russian surveillance, and is therefore subject
to Russian censorship.</p>
- <p>However, the point here</em></ins></span> is the <span
class="removed"><del><strong><a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>wrong of Apple's censorship of
- apps.</p></em></ins></span>
+ <p>However, the point here is the wrong of</em></ins></span> Apple's
+ <span class="removed"><del><strong>security</strong></del></span> <span
class="inserted"><ins><em>censorship of
+ apps.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701050">
- <p>Apple used its censorship system to enforce China's
censorship</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by blocking distribution of</em></ins></span> the <span
class="removed"><del><strong>iThing is, and
- get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>New York Times
app</a>.</p></em></ins></span>
+ <li id="M201701050">
+ <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access
any</strong></del></span> <span class="inserted"><ins><em>enforce China's
censorship <a
+
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
+ by blocking distribution of the New York Times app</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605190">
- <p>Apple censors games,</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning</em></ins></span> some <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>games</em></ins></span> from <span
class="removed"><del><strong>iPhones for</strong></del></span> the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>cr…app store</a> because of which
+ <li id="M201605190">
+ <p>Apple censors games, <a
+
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+ banning some games from the cr…app store</a> because of which
political points they suggest. Some political points are apparently
considered acceptable.</p>
</li>
<li id="M201509290">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+ <p>Apple <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
banned a program from the App Store</a> because its developers
- committed the enormity of disassembling some
iThings.</p></em></ins></span>
+ committed the enormity of disassembling some iThings.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="incompatibility">Apple Incompatibility</h3>
-
-<p>In this section, we list characteristics</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509230">
- <p>As</em></ins></span> of <span
class="inserted"><ins><em>2015,</em></ins></span> Apple <span
class="removed"><del><strong>programs</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201509230">
+ <p>As of 2015, Apple <a
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically bans apps</em></ins></span> that <span
class="removed"><del><strong>block</strong></del></span> <span
class="inserted"><ins><em>endorse abortion rights</em></ins></span> or
-<span class="removed"><del><strong>hinder users from switching to any
alternative program—and, in
-particular, from switching to free software which can liberate the device
-the software runs on.</p>
-
-<ul>
-<li>
-<p>Apple devices lock users in</strong></del></span> <span
class="inserted"><ins><em>would help
+ systematically bans apps that endorse abortion rights or would help
women find abortions</a>.</p>
- <p>This particular political slant</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
-solely to Apple services</a> by being designed to be incompatible with
all</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects</em></ins></span> other <span
class="removed"><del><strong>options, ethical or
unethical.</p></strong></del></span> <span
class="inserted"><ins><em>Apple services</a>.</p></em></ins></span>
+ <p>This particular political slant <a
+
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+ affects other Apple services</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>iWork (office software</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506250">
+ <li id="M201506250">
<p>Apple has banned iThing
- applications</em></ins></span> that <span
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
-formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means</strong></del></span> <span class="inserted"><ins><em>show the
confederate flag. <a
+ applications that show the confederate flag. <a
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
- Not only those that use it as a symbol</em></ins></span> of <span
class="removed"><del><strong>converting them</strong></del></span> <span
class="inserted"><ins><em>racism</a>, but even
- strategic games that use it</em></ins></span> to <span
class="removed"><del><strong>or from Open Document Formats</a>. iWork
formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>represent
confederate army units
- fighting in</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>Civil War.</p>
+ Not only those that use it as a symbol</em></ins></span> of <span
class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <p>This ludicrous rigidity illustrates the point that Apple should
- not be allowed to censor apps. Even if Apple carried out this
act</em></ins></span> of <span class="removed"><del><strong>thwarting <a
-href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
-efforts</a>, thus preventing free software from fully supporting
them.</p>
+ <li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ MacOS automatically sends</strong></del></span> <span
class="inserted"><ins><em>racism</a>, but even
+ strategic games that use it</em></ins></span> to <span
class="inserted"><ins><em>represent confederate army units
+ fighting in the Civil War.</p>
-<p>iWork formats</strong></del></span>
- <span class="inserted"><ins><em>censorship with some care, it would still
be wrong. Whether racism
- is bad, whether educating people about drone attacks is
bad,</em></ins></span> are <span class="removed"><del><strong>considered <a
-href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
-unfit for document preservation</a>.</p></strong></del></span>
<span class="inserted"><ins><em>not
- the real issue. Apple should not have the power to impose its views
- about either of these questions, or any other.</p></em></ins></span>
+ <p>This ludicrous rigidity illustrates the point
that</em></ins></span> Apple <span class="removed"><del><strong>servers unsaved
documents being
+ edited</a>. The <a
+
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
+ things you have</strong></del></span> <span
class="inserted"><ins><em>should</em></ins></span>
+ not <span class="removed"><del><strong>decided</strong></del></span> <span
class="inserted"><ins><em>be allowed</em></ins></span> to <span
class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>censor apps. Even if Apple carried out this act of
+ censorship with some care, it would still be wrong. Whether racism
+ is bad, whether educating people about drone attacks is
bad,</em></ins></span> are <span class="removed"><del><strong>even more
sensitive than</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span>
+ the
+ <span class="removed"><del><strong>things you have stored in
files</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>In MacOS</strong></del></span>
+ <li><p>Apple has made various
+ <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files to</strong></del></span> <span
class="inserted"><ins><em>real issue.</em></ins></span> Apple <span
class="removed"><del><strong>servers without asking permission</a>.
+ This exposes</strong></del></span> <span class="inserted"><ins><em>should
not have</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>power</em></ins></span> to <span
class="removed"><del><strong>Big Brother</strong></del></span> <span
class="inserted"><ins><em>impose its views
+ about either of these questions, or any other.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201412110">
+ <li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>iOS,</strong></del></span> <span
class="inserted"><ins><em>inconsistent censorship</a>.</p>
+ More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>perhaps</strong></del></span> <span
class="inserted"><ins><em>inconsistent censorship</a>.</p>
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014 to <a
+ <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>other snoops.</p>
+
+ <p>It</strong></del></span> <span class="inserted"><ins><em><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>procedure</strong></del></span> <span
class="inserted"><ins><em>iThings</em></ins></span> for <span
class="inserted"><ins><em>a time. It also <a
+ ban all bitcoin apps</a> for the iThings for a time.
It</em></ins></span> also <span class="removed"><del><strong>demonstrates how
you can't trust proprietary software,
+ because even if today's version doesn't have</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
- banned a game about growing marijuana</a>, while permitting games
+ banned</em></ins></span> a <span class="removed"><del><strong>malicious
+ functionality, tomorrow's version might add it. The developer won't
+ remove</strong></del></span> <span class="inserted"><ins><em>game about
growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
killing more acceptable than marijuana.</p>
</li>
<li id="M201402070">
- <p>Apple rejected an app that displayed the locations
+ <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>malfeature unless many users push back hard,
and</strong></del></span> <span class="inserted"><ins><em>locations
of US drone assassinations, giving various excuses. Each
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p>
+ admitted it was censoring the app based on</em></ins></span> the <span
class="removed"><del><strong>users
+ can't remove it themselves.</p></strong></del></span> <span
class="inserted"><ins><em>subject matter</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Various operations in
+ <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id="pressuring">Apple Pressuring</h3>
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send</strong></del></span> <span
class="inserted"><ins><em>software. This section</em></ins></span> reports
<span class="inserted"><ins><em>examples of hard sell and other unjust
commercial tactics by Apple.</p>
<ul class="blurbs">
<li id="M201510270">
- <p>Apple Siri</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
-converting images from the Photos format</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</em></ins></span>
- to <span class="removed"><del><strong>a free format is so tedious
-and time-consuming that users just</strong></del></span> give <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>you information</a> about music
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot
of them.</p></strong></del></span> <span class="inserted"><ins><em>you're
not an Apple
+ <p>Apple Siri <a
+
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</em></ins></span>
+ to <span class="removed"><del><strong>Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>give
you information</a> about music charts if you're not an Apple
Music subscriber.</p></em></ins></span>
</li>
-</ul>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<h3 <span class="removed"><del><strong>id="drm">Apple DRM</h3>
-<ul>
- <li><p>iTunes videos have DRM,</strong></del></span> <span
class="inserted"><ins><em>id="sabotage">Apple Sabotage</h3>
-<p>These are situations in</em></ins></span> which <span
class="removed"><del><strong>allows</strong></del></span> Apple <span
class="inserted"><ins><em>employs its power over users</em></ins></span>
-to <span class="inserted"><ins><em>directly intervene in ways that harm them
or block their work.</p>
+<h3 id="sabotage">Apple Sabotage</h3>
+
+<p>These are situations</em></ins></span> in <span
class="removed"><del><strong>MacOS:
+ <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms</strong></del></span>
<span class="inserted"><ins><em>which Apple employs its power over
users</em></ins></span>
+to <span class="removed"><del><strong>Apple.</p>
+ </li>
+
+ <li><p>Apple admits the
+ <a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+ spying</strong></del></span> <span class="inserted"><ins><em>directly
intervene</em></ins></span> in <span class="removed"><del><strong>a search
facility</a>, but there's a lot
+ <a href="https://github.com/fix-macosx/yosemite-phone-home">
+ more snooping</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> that <span
class="removed"><del><strong>Apple</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
<ul class="blurbs">
<li id="M201805310">
- <p>Apple has</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where</strong></del></span>
+ <p>Apple</em></ins></span> has <span
class="removed"><del><strong>not talked about</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no possible
+ purpose other than surveillance</a>. Here is the <a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+
+ <li><p>The <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is, and
+ get other info too.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading</em></ins></span> its <span
class="removed"><del><strong>customers can
- watch the videos</strong></del></span> <span class="inserted"><ins><em>app
for a month</a>.</p>
+ Telegram</em></ins></span> from <span
class="removed"><del><strong>iPhones</strong></del></span> <span
class="inserted"><ins><em>upgrading its app</em></ins></span> for <span
class="removed"><del><strong>the state</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>a
month</a>.</p></em></ins></span>
- <p>This evidently has to do with Russia's command to Apple to block
+ <p>This <span class="removed"><del><strong>may have
improved</strong></del></span> <span class="inserted"><ins><em>evidently has to
do</em></ins></span> with
+ <span class="removed"><del><strong><a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>;</strong></del></span> <span
class="inserted"><ins><em>Russia's command to Apple to block
Telegram in Russia.</p>
- <p>The Telegram client is free software on other platforms, but not
on
+ <p>The Telegram client is free software on other
platforms,</em></ins></span> but
+ <span class="removed"><del><strong><a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></strong></del></span>
not <span class="removed"><del><strong>as much as Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>on
iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>,</em></ins></span> they <span
class="removed"><del><strong>purchased</a>.</p></strong></del></span>
<span class="inserted"><ins><em>don't permit any app to be free
software.</p></em></ins></span>
+ are jails</a>, they don't permit any app to be free
software.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <span class="removed"><del><strong><li><p>The
DMCA</strong></del></span>
+<h3 id="incompatibility">Apple Incompatibility</h3>
+
+<p>In this section, we list characteristics</strong></del></span>
<span class="inserted"><ins><em><li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot
drives,</em></ins></span> and <span class="removed"><del><strong>the EU
Copyright Directive make it</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span class="inserted"><ins><em>file
system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of
MacOS.</p></em></ins></span>
+ <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
+
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
+ changes the file system from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="inserted"><ins><em>MacOS.</p>
</li>
- <span class="removed"><del><strong><li><p><a
-
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706060">
+ <li id="M201706060">
<p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
- <p>Meanwhile,</em></ins></span> Apple <span
class="removed"><del><strong>uses DRM software to prevent</strong></del></span>
<span class="inserted"><ins><em>stops</em></ins></span> people from <span
class="removed"><del><strong>charging an iThing with a
- generic USB cable</a>.</p></li>
-
- <li><p><a
-
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on</strong></del></span> <span class="inserted"><ins><em>fixing
problems themselves;
- that's</em></ins></span> the <span class="removed"><del><strong>fact that
a new model</strong></del></span> <span
class="inserted"><ins><em>nature</em></ins></span> of <span
class="removed"><del><strong>Macbook introduced a requirement
- for monitors to have malicious hardware, but DRM software in MacOS is
- involved in activating the hardware. The software for accessing iTunes
- is also responsible.</p></strong></del></span> <span
class="inserted"><ins><em>proprietary software.</p></em></ins></span>
+ <p>Meanwhile,</em></ins></span> Apple <span
class="removed"><del><strong>programs that block or
+hinder users</strong></del></span> <span class="inserted"><ins><em>stops
people</em></ins></span> from <span
class="removed"><del><strong>switching</strong></del></span> <span
class="inserted"><ins><em>fixing problems themselves;
+ that's the nature of proprietary software.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704070">
+ <li id="M201704070">
<p id="iphone7-sabotage">The
- iPhone 7 contains</em></ins></span> DRM <span
class="removed"><del><strong>that caters</strong></del></span> <span
class="inserted"><ins><em>specifically designed</em></ins></span> to <span
class="removed"><del><strong>Bluray disks</a>.
(The</strong></del></span> <span class="inserted"><ins><em><a
+ iPhone 7 contains DRM specifically designed</em></ins></span> to <span
class="removed"><del><strong>any alternative program—and, in
+particular, from switching</strong></del></span> <span
class="inserted"><ins><em><a
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock">
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The</em></ins></span> article <span
class="removed"><del><strong>focused on Windows
- and said that MacOS would do</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>same thing subsequently.)</p></li>
-</ul>
+ <p>The article uses the term “lock”</em></ins></span>
+ to <span class="removed"><del><strong>free software which can
liberate</strong></del></span> <span
class="inserted"><ins><em>describe</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span
class="removed"><del><strong>software runs on.</p>
-<h3 id="jails">Apple Jails</h3>
-
-<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
-iOS,</strong></del></span> <span class="inserted"><ins><em>term
“lock”
- to describe</em></ins></span> the <span
class="removed"><del><strong>operating system of</strong></del></span> <span
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span
class="removed"><del><strong>Apple iThings, is</strong></del></span> <span
class="inserted"><ins><em>term <a
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
handcuffs</a>.</p>
</li>
- <li id="M201606080">
- <p>Apple <a
+ <li id="M201606080"></em></ins></span>
+ <p>Apple <span class="removed"><del><strong>devices
lock</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
- stops users from fixing</em></ins></span> the <span
class="removed"><del><strong>prototype
-of a jail</a>. It was</strong></del></span> <span
class="inserted"><ins><em>security bugs in Quicktime for Windows</a>,
- while refusing to fix them itself.</p>
+ stops</em></ins></span> users <span class="inserted"><ins><em>from fixing
the security bugs</em></ins></span> in <span class="removed"><del><strong><a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+solely</strong></del></span> <span class="inserted"><ins><em>Quicktime for
Windows</a>,
+ while refusing</em></ins></span> to <span class="inserted"><ins><em>fix
them itself.</p>
</li>
<li id="M201605040">
- <p>The</em></ins></span> Apple <span
class="removed"><del><strong>that introduced</strong></del></span> <span
class="inserted"><ins><em>Music client program <a
-
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
- the <span class="removed"><del><strong>practice of
-designing general purpose computers with censorship of application
-programs.</p>
+ <p>The</em></ins></span> Apple <span
class="removed"><del><strong>services</a> by being
designed</strong></del></span> <span class="inserted"><ins><em>Music client
program <a
+
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
+ the user's file system for music files, copies them</em></ins></span> to
<span class="removed"><del><strong>be incompatible with all
+other options, ethical or unethical.</p>
+</li>
-<p>Here is</strong></del></span> <span class="inserted"><ins><em>user's
file system for music files, copies them to</em></ins></span> an <span
class="removed"><del><strong>article about the</strong></del></span> <span
class="inserted"><ins><em>Apple server,
- and deletes them</a>.</p>
+<li>
+<p>iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats</strong></del></span> <span class="inserted"><ins><em>an Apple
server,</em></ins></span>
+ and <span class="inserted"><ins><em>deletes them</a>.</p>
</li>
<li id="M201602050">
- <p>iOS version 9 for iThings</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
- them irreparably if they were repaired by someone other than
- Apple</a>. Apple eventually backed off from this policy under
- criticism from</em></ins></span> the <span
class="inserted"><ins><em>users. However, it has not acknowledged that this
- was wrong.</p>
+ <p>iOS version 9 for iThings</em></ins></span> <a <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork">provides
no means
+of converting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages</em></ins></span>
+ them <span class="removed"><del><strong>to or from Open Document
Formats</a>. iWork formats
+have changed several times since</strong></del></span> <span
class="inserted"><ins><em>irreparably if</em></ins></span> they were <span
class="removed"><del><strong>first introduced. This may have
+had the effect of thwarting <a
+href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
+efforts</a>, thus preventing free software</strong></del></span> <span
class="inserted"><ins><em>repaired by someone other than
+ Apple</a>. Apple eventually backed off</em></ins></span> from <span
class="removed"><del><strong>fully supporting them.</p>
+
+<p>iWork formats are considered <a
+href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
+unfit for document preservation</a>.</p></strong></del></span>
<span class="inserted"><ins><em>this policy under
+ criticism from the users. However, it has not acknowledged that this
+ was wrong.</p></em></ins></span>
</li>
- <li id="M201510020">
- <p>Apple forced millions of</em></ins></span> iThings <span
class="removed"><del><strong>use</strong></del></span> to <span
class="removed"><del><strong>lock up</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://discussions.apple.com/thread/7256669?tstart=0">download
- a system upgrade without asking</em></ins></span> the <span
class="removed"><del><strong>user.</p>
+<span class="removed"><del><strong><li>
+<p>In MacOS and iOS,</strong></del></span>
-<p>Curiously,</strong></del></span> <span
class="inserted"><ins><em>users</a>.</em></ins></span> Apple <span
class="removed"><del><strong>is beginning to allow limited passage
through</strong></del></span> <span class="inserted"><ins><em>did not
- forcibly install</em></ins></span> the
-<span class="removed"><del><strong>walls</strong></del></span> <span
class="inserted"><ins><em>upgrade but the downloading alone caused
lots</em></ins></span>
- of <span class="inserted"><ins><em>trouble.</p>
+ <span class="inserted"><ins><em><li id="M201510020">
+ <p>Apple forced millions of iThings to <a
+ href="https://discussions.apple.com/thread/7256669?tstart=0">download
+ a system upgrade without asking</em></ins></span> the <span
class="removed"><del><strong>procedure for</strong></del></span> <span
class="inserted"><ins><em>users</a>. Apple did not
+ forcibly install the upgrade but the downloading alone caused lots
+ of trouble.</p>
</li>
<li id="M201412040">
- <p>Apple <a
-
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods</em></ins></span> the <span
class="removed"><del><strong>iThing jail:</strong></del></span> <span
class="inserted"><ins><em>music that</em></ins></span> users <span
class="removed"><del><strong>can now install apps built</strong></del></span>
<span class="inserted"><ins><em>had got</em></ins></span> from
-<span class="removed"><del><strong>source code, provided the source code is
written in Swift. Users
-cannot do this freely because they are required to identify
-themselves.</strong></del></span> <span class="inserted"><ins><em>internet
music
+ <p>Apple</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
+converting images</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted</em></ins></span> from <span
class="inserted"><ins><em>iPods</em></ins></span> the <span
class="removed"><del><strong>Photos format</a> to a free format is so
tedious
+and time-consuming</strong></del></span> <span
class="inserted"><ins><em>music</em></ins></span> that users <span
class="removed"><del><strong>just give up if they have a lot of
them.</p></strong></del></span> <span class="inserted"><ins><em>had got
from internet music
stores that competed with iTunes</a>.</p>
</li>
@@ -779,104 +738,151 @@
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
An Apple firmware “upgrade” bricked iPhones that had been
unlocked</a>. The “upgrade” also deactivated
applications
- not approved by</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.apple.com/xcode/">Here
-are details</a>. While</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Apple
- censorship</a>. All</em></ins></span> this <span
class="removed"><del><strong>is a crack in</strong></del></span> <span
class="inserted"><ins><em>was apparently intentional.</p>
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
+ censorship</a>. All this was apparently
intentional.</p></em></ins></span>
</li>
</ul>
-<h3 id="surveillance">Apple Surveillance</h3>
+<h3 <span class="removed"><del><strong>id="drm">Apple DRM</h3>
+<ul>
+ <li><p>iTunes videos have DRM, which allows Apple
to</strong></del></span> <span
class="inserted"><ins><em>id="surveillance">Apple Surveillance</h3>
<ul class="blurbs">
<li id="M201809070">
- <p>Adware Doctor, an ad blocker for MacOS, <a
-
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports</em></ins></span>
- the <span class="removed"><del><strong>prison walls,</strong></del></span>
<span class="inserted"><ins><em>user's browsing history</a>.</p>
+ <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its customers can
+ watch</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports</em></ins></span>
+ the <span class="removed"><del><strong>videos they
purchased</a>.</p></strong></del></span> <span
class="inserted"><ins><em>user's browsing
history</a>.</p></em></ins></span>
</li>
- <li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>is not
-big enough</strong></del></span> <span class="inserted"><ins><em><a
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711250">
+ <p>The</em></ins></span> DMCA and the EU Copyright Directive make it
<a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>mean
that</strong></del></span> <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ illegal to study how iOS <span
class="removed"><del><strong>cr...apps</strong></del></span> <span
class="inserted"><ins><em>cr…apps</em></ins></span> spy on <span
class="removed"><del><strong>users</a>, because this
+ would require circumventing the iOS DRM.</p>
+ </li>
+
+ <li><p><a
+
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">
+ Apple uses DRM software to prevent people from charging an iThing with a
+ generic USB cable</a>.</p></li>
+
+ <li><p><a
+
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
+ DRM (digital restrictions mechanisms) in MacOS</a>. This article
+ focuses on the fact that a new model of Macbook introduced a requirement
+ for monitors to have malicious hardware, but DRM software in MacOS is
+ involved in activating the hardware. The software for accessing iTunes
+ is also responsible.</p>
+ </li>
+
+ <li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do the same thing
subsequently.)</p></li>
+</ul>
+
+<h3 id="jails">Apple Jails</h3>
+
+<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
+iOS, the operating system of the Apple iThings, is the prototype
+of a jail</a>. It was Apple that introduced the practice of
+designing general purpose computers with censorship of application
+programs.</p>
+
+<p>Here is an article about</strong></del></span> <span
class="inserted"><ins><em>users</a>, because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong><a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+code signing</a> that</strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In</em></ins></span> the <span
class="inserted"><ins><em>latest</em></ins></span> iThings <span
class="removed"><del><strong>are no longer jails.</p>
+ <p>In</em></ins></span> the <span
class="inserted"><ins><em>latest</em></ins></span> iThings <span
class="removed"><del><strong>use to lock up</strong></del></span> <span
class="inserted"><ins><em>system,
+ “turning off” WiFi and Bluetooth</em></ins></span> the <span
class="removed"><del><strong>user.</p>
-<h4>Examples of censorship by Apple jails</h4>
-<ul>
- <li>
- <p>Apple</strong></del></span> <span
class="inserted"><ins><em>system,
- “turning off” WiFi and Bluetooth the obvious
way</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
- deleted several VPNs from its app store</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+<p>Curiously,</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>China</a>, thus using
- its own censorship power</strong></del></span> <span
class="inserted"><ins><em>you—“We
- know you want</em></ins></span> to <span
class="removed"><del><strong>strengthen that of the Chinese
- government.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
+ them off—only until 5am. That's</em></ins></span> Apple <span
class="removed"><del><strong>is beginning</strong></del></span> <span
class="inserted"><ins><em>for you—“We
+ know you want</em></ins></span> to <span
class="removed"><del><strong>allow limited passage
through</strong></del></span> <span class="inserted"><ins><em>be spied
on”.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702150"></em></ins></span>
- <p>Apple <span class="removed"><del><strong>is</strong></del></span>
<span class="inserted"><ins><em>proposes</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
- censoring apps for the US government too</a>. Specifically, it
- is deleting apps developed by Iranians.</p>
- <p>The root of these wrongs are in Apple. If Apple had not designed
- the iMonsters</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>let Apple censor applications,
Apple</strong></del></span> <span class="inserted"><ins><em>use it without
having your fingerprints taken. Users</em></ins></span> would <span
class="removed"><del><strong>not</strong></del></span> have
- <span class="removed"><del><strong>had</strong></del></span>
- <span class="inserted"><ins><em>no way to tell whether</em></ins></span>
the <span class="removed"><del><strong>power</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
+ <li id="M201702150">
+ <p>Apple proposes <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ fingerprint-scanning touch screen</a>—which would mean no way
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether</em></ins></span> the
+<span class="removed"><del><strong>walls</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
</li>
<li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots of personal data</em></ins></span> to <span
class="removed"><del><strong>stop users</strong></del></span> <span
class="inserted"><ins><em>Apple's servers</a>. Big Brother can get
- them</em></ins></span> from <span class="removed"><del><strong>installing
whatever kind of apps.</p></strong></del></span> <span
class="inserted"><ins><em>there.</p></em></ins></span>
+ lots</em></ins></span> of <span class="removed"><del><strong>the iThing
jail: users</strong></del></span> <span class="inserted"><ins><em>personal data
to Apple's servers</a>. Big Brother</em></ins></span> can <span
class="removed"><del><strong>now install apps built</strong></del></span> <span
class="inserted"><ins><em>get
+ them</em></ins></span> from
+<span class="removed"><del><strong>source code, provided the source code is
written in Swift. Users
+cannot do this freely because they are required to identify
+themselves.</strong></del></span> <span
class="inserted"><ins><em>there.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Apple used its censorship system</strong></del></span>
+ <li id="M201609280">
+ <p>The iMessage app on iThings</em></ins></span> <a <span
class="removed"><del><strong>href="https://developer.apple.com/xcode/">Here
+are details</a>. While this is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</em></ins></span>
+ a <span class="removed"><del><strong>crack in the prison walls, it is not
+big enough to mean</strong></del></span> <span
class="inserted"><ins><em>server every phone number</em></ins></span> that the
<span class="removed"><del><strong>iThings are no longer jails.</p>
- <span class="inserted"><ins><em><li id="M201609280">
- <p>The iMessage app on iThings <a
-
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
- server records these numbers for at least 30 days.</p>
+<h4>Examples of censorship by Apple jails</h4>
+<ul>
+ <li>
+ <p>Apple <a
+
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
+ deleted several VPNs from its app store</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>; the
+ server records these numbers</em></ins></span> for <span
class="removed"><del><strong>China</a>, thus using
+ its own censorship power</strong></del></span> <span
class="inserted"><ins><em>at least 30 days.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload to Apple's servers all the photos
+ <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>strengthen that of</strong></del></span> <span
class="inserted"><ins><em>Apple's servers all</em></ins></span> the <span
class="removed"><del><strong>Chinese
+ government.</p>
+ </li>
+
+ <li>
+ <p>Apple is</strong></del></span> <span
class="inserted"><ins><em>photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up</em></ins></span> to <span
class="removed"><del><strong>enforce Russian surveillance</strong></del></span>
<span class="inserted"><ins><em>date on all your devices. Any edits you
+ take, and keeps them up to date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a
href="https://support.apple.com/en-us/HT202033">activated</em></ins></span>
by <span class="removed"><del><strong>blocking distribution
of</strong></del></span> the <span class="removed"><del><strong>LinkedIn app in
Russia</a>.</p>
- <p>This is ironic because LinkedIn</strong></del></span>
- <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
+ <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
+ censoring apps for the US government too</a>. Specifically,
it</strong></del></span> <span
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is <span class="removed"><del><strong>deleting apps
developed</strong></del></span>
+ <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated</em></ins></span>
by <span class="removed"><del><strong>Iranians.</p>
+ <p>The root of these wrongs are in Apple. If Apple had not designed
+ the iMonsters to let Apple censor applications, Apple would not have
+ had</strong></del></span> the <span class="removed"><del><strong>power
to stop users from installing whatever kind</strong></del></span>
+ <span class="inserted"><ins><em>startup</em></ins></span> of <span
class="removed"><del><strong>apps.</p>
+ </li>
+
+ <li>
+ <p>Apple used its censorship system</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
don't ask where.”</p>
- <p>There</em></ins></span> is a <span
class="removed"><del><strong>surveillance system itself.
- While subjecting its users</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>its own surveillance,</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so</em></ins></span> it <span
class="removed"><del><strong>tries to
+ <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>enforce Russian surveillance</strong></del></span>
+ <a
+ <span
class="removed"><del><strong>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0"></strong></del></span>
<span
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT201104">
deactivate
+ iCloud</a>, but it's active</em></ins></span> by <span
class="removed"><del><strong>blocking distribution of the LinkedIn app in
Russia</a>.</p>
+ <p>This is ironic because LinkedIn is</strong></del></span> <span
class="inserted"><ins><em>default so it still counts as</em></ins></span> a
+ surveillance <span class="removed"><del><strong>system itself.
+ While subjecting its users to its own surveillance, it tries to
protect its users from Russian surveillance, and is therefore
- subject</strong></del></span> <span class="inserted"><ins><em>still
counts as a
- surveillance functionality.</p>
+ subject</strong></del></span> <span
class="inserted"><ins><em>functionality.</p>
<p>Unknown people apparently took advantage of
this</em></ins></span> to <span class="removed"><del><strong>Russian
censorship.</p>
<p>However, the point here is the wrong</strong></del></span> <span
class="inserted"><ins><em><a
@@ -991,15 +997,10 @@
Technical presentation</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405080"></em></ins></span>
- <p>Apple <span class="removed"><del><strong>used this censorship
power in 2014</strong></del></span> <span class="inserted"><ins><em>can, and
regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
- </li>
+ <span class="removed"><del><strong><li>
+ <p>Apple used this censorship power in 2014</strong></del></span>
- <li id="M201401101">
+ <span class="inserted"><ins><em><li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="inserted"><ins><em>Apple.</p>
@@ -1148,7 +1149,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:06 $
+$Date: 2018/10/27 08:28:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- po/malware-apple.fr-en.html 25 Oct 2018 11:28:59 -0000 1.61
+++ po/malware-apple.fr-en.html 27 Oct 2018 08:28:52 -0000 1.62
@@ -614,12 +614,6 @@
Technical presentation</a>.</p>
</li>
- <li id="M201405080">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
- </li>
-
<li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
@@ -740,7 +734,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 11:28:59 $
+$Date: 2018/10/27 08:28:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- po/malware-apple.it-diff.html 25 Oct 2018 10:31:06 -0000 1.20
+++ po/malware-apple.it-diff.html 27 Oct 2018 08:28:52 -0000 1.21
@@ -436,19 +436,19 @@
is bad, whether educating people about drone attacks is bad, are not
the real issue. Apple should not have the power</em></ins></span> to
<span class="removed"><del><strong>render
a certain kind</strong></del></span> <span
class="inserted"><ins><em>impose its views
- about either of these questions, or any other.</p>
+ about either</em></ins></span> of <span class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these questions, or any
other.</p></em></ins></span>
</li>
- <li id="M201412110">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples</em></ins></span> of <span
class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Apple's arbitrary and inconsistent
censorship</a>.</p></em></ins></span>
+ More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405250">
+ <li id="M201405250">
<p>Apple used this censorship power</em></ins></span> in <span
class="inserted"><ins><em>2014 to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
ban all bitcoin apps</a> for</em></ins></span> the iThings <span
class="removed"><del><strong>Messages
@@ -514,22 +514,22 @@
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
Telegram from upgrading its app for a month</a>.</p>
- <p>This evidently has to do with Russia's command</em></ins></span>
to <span class="removed"><del><strong>the users of
specific</strong></del></span> Apple <span class="inserted"><ins><em>to block
+ <p>This evidently has to do with Russia's command to Apple to block
Telegram in Russia.</p>
<p>The Telegram client is free software on other platforms, but not
on
iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>, they don't permit any app to be
free</em></ins></span> software.</p>
-
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em></li>
+ are jails</a>, they don't permit any app</em></ins></span> to <span
class="inserted"><ins><em>be free software.</p>
+ </li>
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
- changes the file system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+ changes</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>file system from HFS+ to APFS</a>, which
cannot be
+ accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="removed"><del><strong>specific Apple software.</p>
+
+<ul>
+ <li></strong></del></span> <span
class="inserted"><ins><em>MacOS.</p>
</li>
<li id="M201706060"></em></ins></span>
@@ -742,11 +742,11 @@
<span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201410300">
- <p> MacOS automatically</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ <p> MacOS automatically <a
+
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
sends to Apple servers unsaved documents being edited</a>. The
- things you have not decided to save are <a
-
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
+ things you have not decided to save are</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
even more sensitive</a> than</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send reports to Apple</a>
servers.</p>
</li>
@@ -830,35 +830,29 @@
<ul>
<li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
iOS, the operating system of the Apple iThings, is a jail for
- users.</a> That means it imposes censorship</strong></del></span>
+ users.</a> That means it imposes censorship of application
programs.</p>
+
+ <p>Apple has used this power to
+ <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ censor all bitcoin apps</a> for the iThings.</p>
+
+ <p>Apple, in the iThings, pioneered the practice of general purpose
+ computers that are jails, and the term comes from iThing users, who
+ referred</strong></del></span>
<span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="removed"><del><strong>application programs.</p>
+ Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>escaping from the censorship as
“jailbreaking.”</p>
- <p>Apple has used this power</strong></del></span> <span
class="inserted"><ins><em>iOS seem</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- censor all bitcoin apps</a></strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>the iThings.</p>
-
- <p>Apple, in the iThings, pioneered the practice of
general</strong></del></span> <span class="inserted"><ins><em>no
possible</em></ins></span> purpose
- <span class="removed"><del><strong>computers that are jails, and the term
comes from iThing users, who
- referred to escaping from the censorship as
“jailbreaking.”</p>
-
- <p>Here</strong></del></span> <span class="inserted"><ins><em>other
than surveillance</a>. Here</em></ins></span> is <span
class="removed"><del><strong>an article about</strong></del></span> the <a
+ <p>Here</strong></del></span> <span class="inserted"><ins><em>exist
+ for no possible purpose other than surveillance</a>.
Here</em></ins></span> is <span class="removed"><del><strong>an article
about</strong></del></span> the <a
<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that</strong></del></span>
+ code signing</a> that the iThings use</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
- <li id="M201405080">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>iThings use</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
- </li>
-
<li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
@@ -1011,7 +1005,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:06 $
+$Date: 2018/10/27 08:28:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- po/malware-apple.ja-diff.html 25 Oct 2018 10:31:06 -0000 1.33
+++ po/malware-apple.ja-diff.html 27 Oct 2018 08:28:52 -0000 1.34
@@ -198,67 +198,71 @@
<ul>
<li>
- <p>A vulnerability in Apple's Image I/O API
allowed</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
<ul class="blurbs">
<li id="M201704071">
- <p>DRM makes the iPhone 7 nearly <a
- href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
+ <p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which</strong></del></span>
+ <span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
</li>
<li id="M201512260">
<p><a
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
- Apple uses DRM software to prevent people from charging</em></ins></span>
an <span class="removed"><del><strong>attacker</strong></del></span> <span
class="inserted"><ins><em>iThing
- with a generic USB cable</a>.</p>
+ Apple</em></ins></span> uses <span class="removed"><del><strong>this
API</strong></del></span> <span class="inserted"><ins><em>DRM
software</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
+ with</em></ins></span> a <span class="removed"><del><strong>certain kind
of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>generic USB
cable</a>.</p></em></ins></span>
</li>
- <li id="M200811210">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200811210">
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model of Macbook introduced a
- requirement for monitors to have malicious hardware, but DRM software
+ DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="inserted"><ins><em>MacOS</a>. This article
+ focuses on</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
<span class="inserted"><ins><em>fact that a new model of Macbook
introduced</em></ins></span> a
+ <span class="inserted"><ins><em>requirement for monitors to
have</em></ins></span> malicious <span class="removed"><del><strong>web
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM
software
in MacOS is involved in activating the hardware. The software for
accessing iTunes is also responsible.</p>
</li>
<li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on Windows
- and said that MacOS would do the same thing subsequently.)</p>
+ DRM that caters</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>Bluray disks</a>. (The article focused on
Windows
+ and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>same
thing subsequently.)</p>
</li>
<li id="M200703310">
- <p>iTunes videos have DRM, which allows Apple</em></ins></span> to
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code</strong></del></span>
- <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its
- customers can watch the videos they purchased</a>.</p>
+ <p>iTunes videos have DRM, which allows Apple to <a
+ href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
+ customers can watch the videos they
purchased</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="incompatibility">Apple Incompatibility</h3>
+<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
+<p>Various proprietary</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Apple
Incompatibility</h3>
-<p>In this section, we list characteristics of Apple programs that block
or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching
to</em></ins></span> any <span
class="removed"><del><strong>application</strong></del></span> <span
class="inserted"><ins><em>alternative program—and, in
-particular, from switching to free software</em></ins></span> which <span
class="removed"><del><strong>uses this API</strong></del></span> <span
class="inserted"><ins><em>can liberate the device
+<p>In this section, we list characteristics of Apple</em></ins></span>
programs <span class="removed"><del><strong>often mess up</strong></del></span>
<span class="inserted"><ins><em>that block or
+hinder users from switching to any alternative program—and, in
+particular, from switching to free software which can
liberate</em></ins></span> the <span class="removed"><del><strong>user's
system. They are like sabotage, but</strong></del></span> <span
class="inserted"><ins><em>device
the software runs on.</p>
<ul class="blurbs">
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
- converting images from the Photos format</a></em></ins></span> to
<span class="removed"><del><strong>render</strong></del></span> a <span
class="removed"><del><strong>certain kind</strong></del></span> <span
class="inserted"><ins><em>free format is so
- tedious and time-consuming that users just give up if they have a
- lot</em></ins></span> of <span class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ converting images from the Photos format</a> to a free format is so
+ tedious and time-consuming that users just give up if</em></ins></span>
they <span class="removed"><del><strong>are not grave
enough</strong></del></span> <span class="inserted"><ins><em>have a
+ lot of them.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users</em></ins></span> in <span
class="inserted"><ins><em><a
+ <li id="M201802120">
+ <p>Apple devices lock users in <a
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
solely to Apple services</a> by being designed to be incompatible
with all other options, ethical or unethical.</p>
@@ -433,34 +437,26 @@
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014 to <a
+ <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the iThings <span
class="removed"><del><strong>Messages
- app</strong></del></span> <span class="inserted"><ins><em>for a time.
It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
+ ban all bitcoin apps</a></em></ins></span> for the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples of Apple committing
+interference.</p>
+
+<ul>
+ <li><p>Apple forced millions of</strong></del></span> iThings
<span class="removed"><del><strong>to download</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> a <span
class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
- banned</em></ins></span> a <span class="removed"><del><strong>malicious
web site to extract all the user's messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>game
about growing marijuana</a>, while permitting games
+ banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
- killing more acceptable than marijuana.</p></em></ins></span>
+ killing more acceptable than marijuana.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="interference">Apple Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
-for</strong></del></span>
- <span class="inserted"><ins><em><li id="M201402070">
- <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples</strong></del></span> <span
class="inserted"><ins><em>locations</em></ins></span>
- of <span class="inserted"><ins><em>US drone assassinations, giving various
excuses. Each
- time the developers fixed one “problem”,</em></ins></span>
Apple <span class="removed"><del><strong>committing
-interference.</p>
-
-<ul>
- <li><p>Apple forced millions of iThings to download a system
upgrade
- <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
- <span class="inserted"><ins><em>complained about another.
After</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>fifth rejection,</em></ins></span> Apple <span
class="removed"><del><strong>did not forcibly install</strong></del></span>
<span class="inserted"><ins><em><a
+ <li id="M201402070">
+ <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>locations
+ of US drone assassinations, giving various excuses. Each
+ time the developers fixed one “problem”,</em></ins></span>
Apple <span class="removed"><del><strong>did not forcibly
install</strong></del></span>
+ <span class="inserted"><ins><em>complained about another.
After</em></ins></span> the <span class="removed"><del><strong>upgrade
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection,
Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>upgrade but</strong></del></span> <span
class="inserted"><ins><em>app based on</em></ins></span> the <span
class="removed"><del><strong>downloading alone caused lots of
trouble.</p></strong></del></span> <span
class="inserted"><ins><em>subject matter</a>.</p></em></ins></span>
+ admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>downloading alone caused lots of
trouble.</p></strong></del></span> <span class="inserted"><ins><em>app
based on the subject matter</a>.</p></em></ins></span>
</li>
</ul>
@@ -683,7 +679,7 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them <span
class="removed"><del><strong>through
+ security to <span class="removed"><del><strong>get at them, but NSA can
access any of them through
<a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
@@ -692,7 +688,7 @@
edited</a>. The <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
things you have not decided to save are even more sensitive than the
- things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>through <a
+ things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>get at them, but NSA can access any of them
through <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
@@ -798,35 +794,29 @@
<ul>
<li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
iOS, the operating system of the Apple iThings, is a jail for
- users.</a> That means it imposes censorship</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
- <p><a
-
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="removed"><del><strong>application programs.</p>
+ users.</a> That means it imposes censorship of application
programs.</p>
- <p>Apple has used this power</strong></del></span> <span
class="inserted"><ins><em>iOS seem</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- censor all bitcoin apps</a></strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>the iThings.</p>
+ <p>Apple has used this power to
+ <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ censor all bitcoin apps</a> for the iThings.</p>
<p>Apple, in the iThings, pioneered the practice of general purpose
computers that are jails, and the term comes from iThing users, who
- referred to escaping from the censorship as
“jailbreaking.”</p>
+ referred</strong></del></span>
- <p>Here</strong></del></span> <span class="inserted"><ins><em>no
possible purpose other than surveillance</a>. Here</em></ins></span> is
<span class="removed"><del><strong>an article about</strong></del></span> the
<a
+ <span class="inserted"><ins><em><li id="M201407230">
+ <p><a
+
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>escaping from the censorship as
“jailbreaking.”</p>
+
+ <p>Here</strong></del></span> <span class="inserted"><ins><em>exist
+ for no possible purpose other than surveillance</a>.
Here</em></ins></span> is <span class="removed"><del><strong>an article
about</strong></del></span> the <a
<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that</strong></del></span>
+ code signing</a> that the iThings use</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
- <li id="M201405080">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>iThings use</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
- </li>
-
<li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
@@ -979,7 +969,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:06 $
+$Date: 2018/10/27 08:28:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- po/malware-apple.nl-diff.html 25 Oct 2018 10:31:08 -0000 1.38
+++ po/malware-apple.nl-diff.html 27 Oct 2018 08:28:52 -0000 1.39
@@ -198,67 +198,71 @@
<ul>
<li>
- <p>A vulnerability in Apple's Image I/O API
allowed</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
<ul class="blurbs">
<li id="M201704071">
- <p>DRM makes the iPhone 7 nearly <a
- href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
+ <p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which</strong></del></span>
+ <span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
</li>
<li id="M201512260">
<p><a
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017">
- Apple uses DRM software to prevent people from charging</em></ins></span>
an <span class="removed"><del><strong>attacker</strong></del></span> <span
class="inserted"><ins><em>iThing
- with a generic USB cable</a>.</p>
+ Apple</em></ins></span> uses <span class="removed"><del><strong>this
API</strong></del></span> <span class="inserted"><ins><em>DRM
software</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
+ with</em></ins></span> a <span class="removed"><del><strong>certain kind
of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>generic USB
cable</a>.</p></em></ins></span>
</li>
- <li id="M200811210">
+ <span class="removed"><del><strong><li>
+ <p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200811210">
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model of Macbook introduced a
- requirement for monitors to have malicious hardware, but DRM software
+ DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="inserted"><ins><em>MacOS</a>. This article
+ focuses on</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
+ app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
<span class="inserted"><ins><em>fact that a new model of Macbook
introduced</em></ins></span> a
+ <span class="inserted"><ins><em>requirement for monitors to
have</em></ins></span> malicious <span class="removed"><del><strong>web
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM
software
in MacOS is involved in activating the hardware. The software for
accessing iTunes is also responsible.</p>
</li>
<li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on Windows
- and said that MacOS would do the same thing subsequently.)</p>
+ DRM that caters</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>Bluray disks</a>. (The article focused on
Windows
+ and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>same
thing subsequently.)</p>
</li>
<li id="M200703310">
- <p>iTunes videos have DRM, which allows Apple</em></ins></span> to
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code</strong></del></span>
- <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its
- customers can watch the videos they purchased</a>.</p>
+ <p>iTunes videos have DRM, which allows Apple to <a
+ href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
+ customers can watch the videos they
purchased</a>.</p></em></ins></span>
</li>
</ul>
-<h3 id="incompatibility">Apple Incompatibility</h3>
+<h3 <span class="removed"><del><strong>id="interference">Apple
Interference</h3>
+<p>Various proprietary</strong></del></span> <span
class="inserted"><ins><em>id="incompatibility">Apple
Incompatibility</h3>
-<p>In this section, we list characteristics of Apple programs that block
or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching
to</em></ins></span> any <span
class="removed"><del><strong>application</strong></del></span> <span
class="inserted"><ins><em>alternative program—and, in
-particular, from switching to free software</em></ins></span> which <span
class="removed"><del><strong>uses this API</strong></del></span> <span
class="inserted"><ins><em>can liberate the device
+<p>In this section, we list characteristics of Apple</em></ins></span>
programs <span class="removed"><del><strong>often mess up</strong></del></span>
<span class="inserted"><ins><em>that block or
+hinder users from switching to any alternative program—and, in
+particular, from switching to free software which can
liberate</em></ins></span> the <span class="removed"><del><strong>user's
system. They are like sabotage, but</strong></del></span> <span
class="inserted"><ins><em>device
the software runs on.</p>
<ul class="blurbs">
<li id="M201803300">
<p>In MacOS and iOS, the procedure for <a
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
- converting images from the Photos format</a></em></ins></span> to
<span class="removed"><del><strong>render</strong></del></span> a <span
class="removed"><del><strong>certain kind</strong></del></span> <span
class="inserted"><ins><em>free format is so
- tedious and time-consuming that users just give up if they have a
- lot</em></ins></span> of <span class="removed"><del><strong>image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ converting images from the Photos format</a> to a free format is so
+ tedious and time-consuming that users just give up if</em></ins></span>
they <span class="removed"><del><strong>are not grave
enough</strong></del></span> <span class="inserted"><ins><em>have a
+ lot of them.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A bug</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users</em></ins></span> in <span
class="inserted"><ins><em><a
+ <li id="M201802120">
+ <p>Apple devices lock users in <a
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
solely to Apple services</a> by being designed to be incompatible
with all other options, ethical or unethical.</p>
@@ -433,34 +437,26 @@
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014 to <a
+ <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>qualify</strong></del></span> <span
class="inserted"><ins><em><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the iThings <span
class="removed"><del><strong>Messages
- app</strong></del></span> <span class="inserted"><ins><em>for a time.
It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
+ ban all bitcoin apps</a></em></ins></span> for the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples of Apple committing
+interference.</p>
+
+<ul>
+ <li><p>Apple forced millions of</strong></del></span> iThings
<span class="removed"><del><strong>to download</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> a <span
class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
- banned</em></ins></span> a <span class="removed"><del><strong>malicious
web site to extract all the user's messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>game
about growing marijuana</a>, while permitting games
+ banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
- killing more acceptable than marijuana.</p></em></ins></span>
+ killing more acceptable than marijuana.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="interference">Apple Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
-for</strong></del></span>
- <span class="inserted"><ins><em><li id="M201402070">
- <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty and wrong. This section describes examples</strong></del></span> <span
class="inserted"><ins><em>locations</em></ins></span>
- of <span class="inserted"><ins><em>US drone assassinations, giving various
excuses. Each
- time the developers fixed one “problem”,</em></ins></span>
Apple <span class="removed"><del><strong>committing
-interference.</p>
-
-<ul>
- <li><p>Apple forced millions of iThings to download a system
upgrade
- <a
href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
- <span class="inserted"><ins><em>complained about another.
After</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>fifth rejection,</em></ins></span> Apple <span
class="removed"><del><strong>did not forcibly install</strong></del></span>
<span class="inserted"><ins><em><a
+ <li id="M201402070">
+ <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>locations
+ of US drone assassinations, giving various excuses. Each
+ time the developers fixed one “problem”,</em></ins></span>
Apple <span class="removed"><del><strong>did not forcibly
install</strong></del></span>
+ <span class="inserted"><ins><em>complained about another.
After</em></ins></span> the <span class="removed"><del><strong>upgrade
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection,
Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>upgrade but</strong></del></span> <span
class="inserted"><ins><em>app based on</em></ins></span> the <span
class="removed"><del><strong>downloading alone caused lots of
trouble.</p></strong></del></span> <span
class="inserted"><ins><em>subject matter</a>.</p></em></ins></span>
+ admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>downloading alone caused lots of
trouble.</p></strong></del></span> <span class="inserted"><ins><em>app
based on the subject matter</a>.</p></em></ins></span>
</li>
</ul>
@@ -683,7 +679,7 @@
<p>Unknown people apparently took advantage of this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them <span
class="removed"><del><strong>through
+ security to <span class="removed"><del><strong>get at them, but NSA can
access any of them through
<a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
@@ -692,7 +688,7 @@
edited</a>. The <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
things you have not decided to save are even more sensitive than the
- things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>through <a
+ things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>get at them, but NSA can access any of them
through <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
@@ -798,35 +794,29 @@
<ul>
<li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
iOS, the operating system of the Apple iThings, is a jail for
- users.</a> That means it imposes censorship</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
- <p><a
-
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="removed"><del><strong>application programs.</p>
+ users.</a> That means it imposes censorship of application
programs.</p>
- <p>Apple has used this power</strong></del></span> <span
class="inserted"><ins><em>iOS seem</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- censor all bitcoin apps</a></strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>the iThings.</p>
+ <p>Apple has used this power to
+ <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ censor all bitcoin apps</a> for the iThings.</p>
<p>Apple, in the iThings, pioneered the practice of general purpose
computers that are jails, and the term comes from iThing users, who
- referred to escaping from the censorship as
“jailbreaking.”</p>
+ referred</strong></del></span>
- <p>Here</strong></del></span> <span class="inserted"><ins><em>no
possible purpose other than surveillance</a>. Here</em></ins></span> is
<span class="removed"><del><strong>an article about</strong></del></span> the
<a
+ <span class="inserted"><ins><em><li id="M201407230">
+ <p><a
+
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>escaping from the censorship as
“jailbreaking.”</p>
+
+ <p>Here</strong></del></span> <span class="inserted"><ins><em>exist
+ for no possible purpose other than surveillance</a>.
Here</em></ins></span> is <span class="removed"><del><strong>an article
about</strong></del></span> the <a
<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that</strong></del></span>
+ code signing</a> that the iThings use</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
- <li id="M201405080">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>iThings use</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
- </li>
-
<li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
@@ -979,7 +969,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- po/malware-apple.ru-en.html 25 Oct 2018 17:00:14 -0000 1.61
+++ po/malware-apple.ru-en.html 27 Oct 2018 08:28:52 -0000 1.62
@@ -614,12 +614,6 @@
Technical presentation</a>.</p>
</li>
- <li id="M201405080">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
- </li>
-
<li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
@@ -740,7 +734,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 17:00:14 $
+$Date: 2018/10/27 08:28:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-cars.de-diff.html 26 Oct 2018 06:58:57 -0000 1.9
+++ po/malware-cars.de-diff.html 27 Oct 2018 08:28:52 -0000 1.10
@@ -79,7 +79,8 @@
<p>But if you really want</em></ins></span> to
<span class="removed"><del><strong>using just</strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
- hardware cannot collect any of that data.</p>
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that data.</p>
</li>
<li id="M201711230">
@@ -358,7 +359,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-cars.de.po 26 Oct 2018 06:58:57 -0000 1.12
+++ po/malware-cars.de.po 27 Oct 2018 08:28:52 -0000 1.13
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -106,7 +106,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/malware-cars.fr.po 26 Oct 2018 11:45:30 -0000 1.18
+++ po/malware-cars.fr.po 27 Oct 2018 08:28:52 -0000 1.19
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-26 13:44+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -110,9 +111,17 @@
"de ce type doit être interdit."
#. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
"Mais si vous voulez être vraiment en sécurité, vous devez vous assurer que
"
"le matériel de la voiture ne peut collecter aucune de ces données."
Index: po/malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/malware-cars.pot 26 Oct 2018 06:58:57 -0000 1.8
+++ po/malware-cars.pot 27 Oct 2018 08:28:52 -0000 1.9
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -86,7 +86,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-cars.ru.po 26 Oct 2018 08:58:11 -0000 1.23
+++ po/malware-cars.ru.po 27 Oct 2018 08:28:52 -0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-09-20 04:21-0500\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -112,9 +113,17 @@
"<em>ÐÑбой</em> ÑÐ±Ð¾Ñ ÑакиÑ
даннÑÑ
должен бÑÑÑ
запÑеÑен."
#. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
"Ðо еÑли Ð²Ñ Ñ
оÑиÑе наÑÑоÑÑей безопаÑноÑÑи,
нÑжно гаÑанÑиÑоваÑÑ, ÑÑо "
"аппаÑаÑÑÑа авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ðµ Ð¼Ð¾Ð¶ÐµÑ ÑобиÑаÑÑ
ниÑего из ÑÑиÑ
даннÑÑ
."
Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/malware-microsoft.de-diff.html 25 Oct 2018 10:31:08 -0000 1.17
+++ po/malware-microsoft.de-diff.html 27 Oct 2018 08:28:52 -0000 1.18
@@ -577,7 +577,7 @@
</li>
<li id="M201608171">
- <p>In order to increase Windows 10's install base, Microsoft <a
+ <p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
</li>
@@ -864,7 +864,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:52 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- po/malware-microsoft.de.po 25 Oct 2018 10:31:08 -0000 1.125
+++ po/malware-microsoft.de.po 27 Oct 2018 08:28:53 -0000 1.126
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -903,11 +903,21 @@
"andere Unternehmen."
#. type: Content of: <ul><li><p>
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"Um Installationsbasis von Windows 10 zu steigern: Microsoft <a href="
"\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
Index: po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- po/malware-microsoft.es.po 25 Oct 2018 10:31:08 -0000 1.123
+++ po/malware-microsoft.es.po 27 Oct 2018 08:28:53 -0000 1.124
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -740,11 +740,21 @@
"se los proporciona a otra compañÃa."
#. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"A fin de incrementar las cifras de instalación de Windows 10, Microsoft <a "
"href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
Index: po/malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- po/malware-microsoft.fr.po 25 Oct 2018 10:58:25 -0000 1.140
+++ po/malware-microsoft.fr.po 27 Oct 2018 08:28:53 -0000 1.141
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-25 12:57+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -729,11 +730,21 @@
"autre société."
#. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"Afin d'élargir la base installée de Windows 10, Microsoft <a
href=\"https://"
"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/malware-microsoft.it-diff.html 25 Oct 2018 10:31:08 -0000 1.16
+++ po/malware-microsoft.it-diff.html 27 Oct 2018 08:28:53 -0000 1.17
@@ -569,7 +569,7 @@
</li>
<li id="M201608171">
- <p>In order to increase Windows 10's install base, Microsoft <a
+ <p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
</li>
@@ -857,7 +857,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/malware-microsoft.it.po 25 Oct 2018 10:31:08 -0000 1.130
+++ po/malware-microsoft.it.po 27 Oct 2018 08:28:53 -0000 1.131
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -855,11 +855,21 @@
"sua volta le invia ad altre aziende."
#. type: Content of: <ul><li><p>
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"Per aumentare il numero di installazioni di Windows 10, Microsoft <a href="
"\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
Index: po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- po/malware-microsoft.ja-diff.html 25 Oct 2018 10:31:08 -0000 1.27
+++ po/malware-microsoft.ja-diff.html 27 Oct 2018 08:28:53 -0000 1.28
@@ -545,7 +545,7 @@
</li>
<li id="M201608171">
- <p>In order to increase Windows 10's install base, Microsoft <a
+ <p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
</li>
@@ -822,7 +822,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- po/malware-microsoft.ja.po 25 Oct 2018 10:31:08 -0000 1.105
+++ po/malware-microsoft.ja.po 27 Oct 2018 08:28:53 -0000 1.106
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -704,11 +704,17 @@
"ä»ããããå¥ã®ä¼ç¤¾ã«ãé
ãã¾ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"ã¦ã£ã³ãã¦ãº10ã®ã¤ã³ã¹ãã¼ã«ãã¼ã¹ãå¢å
ãããããã«ããã¤ã¯ãã½ããã¯<a "
"href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
Index: po/malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/malware-microsoft.pot 25 Oct 2018 10:31:08 -0000 1.70
+++ po/malware-microsoft.pot 27 Oct 2018 08:28:53 -0000 1.71
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -497,6 +497,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"In order to increase Windows 10's install base, Microsoft <a "
+"class=\"not-a-duplicate\" "
"href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
"
"blatantly disregards user choice and privacy</a>."
msgstr ""
Index: po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- po/malware-microsoft.ru.po 25 Oct 2018 17:00:14 -0000 1.183
+++ po/malware-microsoft.ru.po 27 Oct 2018 08:28:53 -0000 1.184
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-10 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -718,11 +719,21 @@
"Microsoft пеÑÐµÐ´Ð°ÐµÑ Ð¸Ñ
дÑÑгой компании."
#. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"Ð ÑелÑÑ
наÑаÑÐ¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑÑкой
Ð±Ð°Ð·Ñ Windows 10 Microsoft <a href="
"\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
Index: po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-mobiles.de-diff.html 25 Oct 2018 10:31:08 -0000 1.13
+++ po/malware-mobiles.de-diff.html 27 Oct 2018 08:28:53 -0000 1.14
@@ -95,7 +95,7 @@
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
often used to make a phone transmit all conversations it
hears</a>.</p>
- <p>The back door <a
+ <p>The back door <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
may take the form of bugs that have gone 20 years unfixed</a>.
The choice to leave the security holes in place is morally
@@ -1128,7 +1128,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/malware-mobiles.de.po 25 Oct 2018 10:31:08 -0000 1.82
+++ po/malware-mobiles.de.po 27 Oct 2018 08:28:53 -0000 1.83
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -158,11 +158,23 @@
"a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>. The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a href=\"http://www.osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>. The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
msgstr ""
"Die Hintertür <a href=\"https://www.osnews.com/story/27416/"
"The_second_operating_system_hiding_in_every_mobile_phone\" title=\"The "
Index: po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- po/malware-mobiles.es.po 25 Oct 2018 10:31:08 -0000 1.77
+++ po/malware-mobiles.es.po 27 Oct 2018 08:28:53 -0000 1.78
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-07-27 11:25+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -144,11 +144,23 @@
"el teléfono transmita todas las conversaciones que escucha</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>. The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a href=\"http://www.osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>. The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
msgstr ""
"La puerta trasera <a href=\"http://www.osnews.com/story/27416/"
"The_second_operating_system_hiding_in_every_mobile_phone\"> puede producirse "
Index: po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- po/malware-mobiles.fr.po 25 Oct 2018 10:58:25 -0000 1.92
+++ po/malware-mobiles.fr.po 27 Oct 2018 08:28:53 -0000 1.93
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-25 12:57+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -139,11 +140,23 @@
"transmettre toutes les conversations qu'il entend</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>. The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a href=\"http://www.osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>. The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
msgstr ""
"Cette porte dérobée <a href=\"http://www.osnews.com/story/27416/"
"The_second_operating_system_hiding_in_every_mobile_phone\">peut prendre la "
Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/malware-mobiles.it-diff.html 25 Oct 2018 10:31:09 -0000 1.18
+++ po/malware-mobiles.it-diff.html 27 Oct 2018 08:28:53 -0000 1.19
@@ -155,7 +155,7 @@
considers malicious. But there is no excuse for
allowing</strong></del></span> <span class="inserted"><ins><em>phone transmit
all conversations</em></ins></span> it
<span class="removed"><del><strong>to
<em>delete</em></strong></del></span> <span
class="inserted"><ins><em>hears</a>.</p>
- <p>The back door <a
+ <p>The back door <a class="not-a-duplicate"
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
may take</em></ins></span> the <span
class="removed"><del><strong>programs, and you should</strong></del></span>
<span class="inserted"><ins><em>form of bugs that</em></ins></span> have <span
class="removed"><del><strong>the right</strong></del></span> <span
class="inserted"><ins><em>gone 20 years unfixed</a>.
The choice</em></ins></span> to
@@ -1172,7 +1172,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:09 $
+$Date: 2018/10/27 08:28:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/malware-mobiles.it.po 25 Oct 2018 10:31:09 -0000 1.82
+++ po/malware-mobiles.it.po 27 Oct 2018 08:28:53 -0000 1.83
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -127,8 +127,8 @@
#. type: Content of: <ul><li><p>
# | [-More about-]{+The back door+} <a
# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">the
-# | nature-]
-# |
{+href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | nature-] {+class=\"not-a-duplicate\"
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
# | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
# | years unfixed</a>. The choice to leave the security holes in place is
# | morally equivalent to writing a back door.+}
@@ -138,10 +138,11 @@
#| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
#| "this problem</a>."
msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>. The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
msgstr ""
"Altre informazioni sulla <a href=\"http://www.osnews.com/story/27416/"
"The_second_operating_system_hiding_in_every_mobile_phone\">natura di questo "
Index: po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- po/malware-mobiles.ja-diff.html 25 Oct 2018 10:31:09 -0000 1.33
+++ po/malware-mobiles.ja-diff.html 27 Oct 2018 08:28:53 -0000 1.34
@@ -134,7 +134,7 @@
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> a <span
class="inserted"><ins><em>phone transmit all conversations it
hears</a>.</p>
- <p>The</em></ins></span> back <span
class="removed"><del><strong>door</a> that provides remote access
to</strong></del></span> <span class="inserted"><ins><em>door <a
+ <p>The</em></ins></span> back <span
class="removed"><del><strong>door</a> that provides remote access
to</strong></del></span> <span class="inserted"><ins><em>door <a
class="not-a-duplicate"
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
may take</em></ins></span> the <span class="removed"><del><strong>data
stored on the
device.</p>
@@ -1017,7 +1017,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:09 $
+$Date: 2018/10/27 08:28:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/malware-mobiles.ja.po 25 Oct 2018 10:31:09 -0000 1.70
+++ po/malware-mobiles.ja.po 27 Oct 2018 08:28:53 -0000 1.71
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -120,10 +120,11 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>. The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/malware-mobiles.pot 25 Oct 2018 10:31:09 -0000 1.49
+++ po/malware-mobiles.pot 27 Oct 2018 08:28:53 -0000 1.50
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -101,7 +101,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The back door <a "
+"The back door <a class=\"not-a-duplicate\" "
"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
"
"may take the form of bugs that have gone 20 years unfixed</a>. The choice "
"to leave the security holes in place is morally equivalent to writing a back "
Index: po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- po/malware-mobiles.ru.po 25 Oct 2018 17:00:14 -0000 1.121
+++ po/malware-mobiles.ru.po 27 Oct 2018 08:28:53 -0000 1.122
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-08 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -136,11 +137,23 @@
"пеÑедаваÑÑ Ð²Ñе ÑазговоÑÑ, коÑоÑÑе он
ÑлÑÑиÑ</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>. The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
+# | may take the form of bugs that have gone 20 years unfixed</a>. The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a href=\"http://www.osnews.com/story/27416/"
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>. The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/"
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>. The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
msgstr ""
"Ðазейка <a href=\"http://www.osnews.com/story/27416/"
"The_second_operating_system_hiding_in_every_mobile_phone\">можеÑ
пÑинимаÑÑ "
Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-surveillance.de-diff.html 27 Oct 2018 01:58:21 -0000
1.12
+++ po/proprietary-surveillance.de-diff.html 27 Oct 2018 08:28:53 -0000
1.13
@@ -274,7 +274,7 @@
</li>
<li id="M201608171">
- <p>In</em></ins></span> order to increase Windows 10's install base,
Microsoft <a
+ <p>In</em></ins></span> order to increase Windows 10's install base,
Microsoft <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>privacy</a>.</p></em></ins></span>
</li>
@@ -324,7 +324,8 @@
<span class="inserted"><ins><em><li id="M201508180">
<p><a
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able to listen</em></ins></span> for <span
class="inserted"><ins><em>speech all the time, even
+ Intel devices will be able to listen</em></ins></span> for <span
class="inserted"><ins><em>speech all</em></ins></span> the
+ <span class="removed"><del><strong>privacy of its users</a>, giving
Microsoft</strong></del></span> <span class="inserted"><ins><em>time, even
when “off.”</a></p>
</li>
@@ -340,8 +341,7 @@
<p>Windows 10 <a
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
ships with default settings that show no regard for the privacy of
- its users</a>, giving Microsoft</em></ins></span> the
- <span class="removed"><del><strong>privacy of its users</a>, giving
Microsoft the</strong></del></span> “right” to snoop on
+ its users</a>, giving Microsoft</em></ins></span> the
“right” to snoop on
the users' files, text input, voice input, location info, contacts,
calendar records and web browsing history, as well as automatically
connecting the machines to open hotspots and showing targeted <span
class="removed"><del><strong>ads.</p></li>
@@ -522,12 +522,24 @@
Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>emails to
snoopers</a>.</p>
- <p>Google</strong></del></span> <span
class="inserted"><ins><em>spyware via
- BIOS</a> on Windows installs. Note that the specific
- sabotage method Lenovo used</em></ins></span> did not <span
class="removed"><del><strong>intend</strong></del></span> <span
class="inserted"><ins><em>affect GNU/Linux; also, a
+ <p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
+ BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
+ worked in various ways to prevent that, and deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares</strong></del></span> <span
class="inserted"><ins><em>specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft puts in its
- own malware</a>.</p>
+ href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
+ being nonfree. It also distributes</strong></del></span> its
+ own <span class="removed"><del><strong>nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
</li>
</ul>
@@ -546,63 +558,59 @@
<ul class="blurbs">
<li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to make <span
class="removed"><del><strong>these apps spy; on</strong></del></span> <span
class="inserted"><ins><em>sure they can't “fool”</em></ins></span>
- the <span class="removed"><del><strong>contrary, it
- worked in various ways</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
+ cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
+ users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
+ proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
+ <span class="removed"><del><strong>do.</p>
+
+ <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>can't “fool”</em></ins></span>
+ the <span class="removed"><del><strong>source code for these
apps,</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>prevent that,</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
+ <p>According to Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the <span
class="removed"><del><strong>snooping of these apps.</p>
-
- <p>On</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
- text messages, read call, location</em></ins></span> and
- <span class="removed"><del><strong>therefore shares
in</strong></del></span> <span class="inserted"><ins><em>web browsing history,
and
- read</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is designed to disguise
itself
+ them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>study</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the
+ <span class="removed"><del><strong>source code
somehow</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat
users</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones,
+ The NSA can tap data</em></ins></span> in
+ <span class="removed"><del><strong>various ways. If it did a good job of
this,</strong></del></span> <span class="inserted"><ins><em>smart phones,
including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>injustice of their
- being nonfree.</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
- phones have.</em></ins></span> It <span class="removed"><del><strong>also
distributes its own nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
-
- <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em><a
+ detail here,</em></ins></span> it <span class="removed"><del><strong>could
more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart</strong></del></span> <span
class="inserted"><ins><em>seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious
apps,</strong></del></span> <span class="inserted"><ins><em>universal back door
that</em></ins></span> we <span class="removed"><del><strong>cannot trust
+ Google to protect us. We must demand release</strong></del></span> <span
class="inserted"><ins><em>know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>preventing
apps from
- cheating? There is no systematic way for Google, or Android
- users, to inspect executable proprietary apps to see what they
- do.</p>
-
- <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> the <span
class="removed"><del><strong>source code for these apps,</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
+ lots</em></ins></span> of <span class="removed"><del><strong>source code
to</strong></del></span> <span class="inserted"><ins><em>bugs
in</em></ins></span> the
+ <span class="removed"><del><strong>public, so we can
depend</strong></del></span> <span class="inserted"><ins><em>phones' radio
software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>study the
- source code somehow to determine whether they
mistreat</strong></del></span> users <span class="removed"><del><strong>in
- various ways. If it did a good job of this,</strong></del></span> <span
class="inserted"><ins><em>cannot stop
- them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>could more or less
- prevent such snooping, except when</strong></del></span> <span
class="inserted"><ins><em>will eventually require all new portable phones
- to have GPS.)</p>
+ will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>each other.</p></strong></del></span> <span
class="inserted"><ins><em>remote command, and users cannot stop
+ them</a>. (The US says it will eventually require all new portable
phones
+ to have GPS.)</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong><li>
+ <p>A</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -612,48 +620,40 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>app developers are clever
- enough</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
- href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p>
+ <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
+ <p>In</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>latest iThings system,
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>security
+ of 283 Android VPN apps concluded that “in spite
of</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the
+ <span class="removed"><del><strong>promises</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>privacy, security, and anonymity given by the
+ majority of VPN apps—millions of users may</strong></del></span>
<span class="inserted"><ins><em>you—“We
+ know you want to</em></ins></span> be <span
class="removed"><del><strong>unawarely subject</strong></del></span> <span
class="inserted"><ins><em>spied on”.</p>
</li>
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>protect us. We must demand release
of source code</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
- no way</em></ins></span> to <span class="inserted"><ins><em>tell
whether</em></ins></span> the
- <span class="removed"><del><strong>public, so we can
depend</strong></del></span> <span class="inserted"><ins><em>phone is
snooping</em></ins></span> on <span class="removed"><del><strong>each
other.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
- <p>A</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security
- of 283 Android VPN apps concluded that “in spite of the
- promises for privacy, security, and anonymity given by the
- majority of VPN apps—millions of users may be unawarely subject
- to poor security guarantees and abusive practices inflicted by
+ to <span class="removed"><del><strong>poor security guarantees and abusive
practices inflicted by
VPN apps.”</p>
<p>Following is a non-exhaustive list of proprietary VPN apps from
- the research paper that tracks and infringes the
privacy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ the research paper that tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>use it without having your fingerprints taken. Users
would have
+ no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
+ </li>
+
+ <li id="M201611170">
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
lots</em></ins></span> of
<span class="removed"><del><strong>users:</p>
@@ -686,14 +686,14 @@
requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span
class="inserted"><ins><em>up</em></ins></span> to <span
class="inserted"><ins><em>date on all your devices. Any edits you
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span
class="inserted"><ins><em>up</em></ins></span> to <span
class="removed"><del><strong>the
+ users.</strong></del></span> <span class="inserted"><ins><em>date on all
your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span>
- <span class="inserted"><ins><em>startup</em></ins></span> of <span
class="removed"><del><strong>the JS injection</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
+ information</a> as accessed on 24 Sep 2015.)</em></ins></span> The
<span class="removed"><del><strong>stated purpose of</strong></del></span>
<span class="inserted"><ins><em>iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>JS
injection</strong></del></span>
+ <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
<p>There</em></ins></span> is <span class="inserted"><ins><em>a
way</em></ins></span> to <span class="removed"><del><strong>display
@@ -709,109 +709,102 @@
surveillance functionality.</p>
<p>Unknown people apparently took advantage</em></ins></span> of
this <span class="removed"><del><strong>app have
- confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
- </dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span> <span
class="inserted"><ins><em>to <a
+ confirmed that the non-premium version</strong></del></span> <span
class="inserted"><ins><em>to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span class="removed"><del><strong>the
top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as
“free”,</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed to break Apple's
- security to get at them,</em></ins></span> but <span
class="removed"><del><strong>most</strong></del></span> <span
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span
class="removed"><del><strong>are not in fact</strong></del></span> <span
class="inserted"><ins><em>through</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ nude photos</em></ins></span> of <span class="removed"><del><strong>the
app does
+ JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>many celebrities</a>. They needed to break
Apple's
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201409220">
- <p>Apple can, and regularly does, <a
+ <li id="M201409220">
+ <p>Apple can,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>regularly
does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>BART</strong></del></span> <span
class="inserted"><ins><em>the state</a>.</p>
-
- <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
+ remotely extract some data from iPhones for the state</a>.</p>
-<li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ <p>This may have improved with <a
+
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but <a
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
not as much as Apple claims</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
- <p><a
-
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
- data</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>exist
- for no possible purpose other than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201407230"></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</em></ins></span> of <span
class="inserted"><ins><em>iOS seem to exist
+ for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em><a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401100">
- <p>The</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
+ <li id="M201401100"></em></ins></span>
+ <p>The <span class="removed"><del><strong>article confusingly
describes gratis apps as “free”,
+ but most of them are not in fact</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses</strong></del></span> <span
class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+ iBeacon</a> lets stores determine exactly where the iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing,
or it</em></ins></span>
- is <span class="removed"><del><strong>not enough
-to legitimize actions like this. At this point, most users have
-stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>totally incompetent</a>.</p>
+ Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
+ for that word</strong></del></span> <span class="inserted"><ins><em>NSA
snoop on all the data in an iThing, or it</em></ins></span>
+ is <span class="removed"><del><strong>“exploit”; nearly always
that will fit
+ perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>totally
incompetent</a>.</p></em></ins></span>
</li>
- <li id="M201308080">
- <p>The iThing also <a
-
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects on</strong></del></span>
<span class="inserted"><ins><em>can be
- turned off.</p>
+<span class="removed"><del><strong><li>
+ <p>Apps for BART</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201308080">
+ <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make
sure</em></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>they don't snoop.</p>
+ <p>With proprietary apps, one</strong></del></span> can <span
class="removed"><del><strong>only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>be
+ turned off.</p></em></ins></span>
</li>
- <li id="M201210170">
- <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
-
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
- still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201210170">
+ <p>There is also a feature for web sites to</em></ins></span> track
<span class="removed"><del><strong>users by</strong></del></span> <span
class="inserted"><ins><em>users, which is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or
played</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</em></ins></span> by <span class="removed"><del><strong>TV
programs</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>default</a>. (That article talks about iOS 6,
but it is
+ still true in iOS 7.)</p></em></ins></span>
</li>
- <li id="M201204280">
- <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps can collude to transmit users' personal
+ data</strong></del></span>
-<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
+ <span class="inserted"><ins><em><li id="M201204280">
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
- email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>receiving
the verification code Apple sends
- to it.</p>
+ to <span class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that collude</a>.</p>
+</li>
+
+<li>
+<p>Google Play intentionally sends app developers <a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that</strong></del></span> install <span
class="inserted"><ins><em>even gratis apps</a>) without giving a valid
+ email address and receiving</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking the “consent” of users is not
enough</strong></del></span> <span class="inserted"><ins><em>verification code
Apple sends</em></ins></span>
+ to <span class="removed"><del><strong>legitimize actions like this. At
this point, most users have
+stopped reading the “Terms and Conditions” that spell out
+what they are “consenting” to.</strong></del></span> <span
class="inserted"><ins><em>it.</p>
</li>
</ul>
@@ -823,17 +816,21 @@
<ul class="blurbs">
<li id="M201711210">
- <p>Android tracks location for Google <a
+ <p>Android tracks location for</em></ins></span> Google <span
class="removed"><del><strong>should clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
even when “location services” are turned off, even
when</em></ins></span>
- the <span class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>phone
has no SIM card</a>.</p>
+ the <span class="removed"><del><strong>information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>phone has no SIM
card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></em></ins></span>
+ sold with spyware sending lots</em></ins></span> of <span
class="removed"><del><strong>hiding it in an obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
+and other companies from getting this personal information in the first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -882,93 +879,79 @@
Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
the <span class="removed"><del><strong>usual analytics tools are
- legitimate, but</strong></del></span> <span class="inserted"><ins><em>FBI
can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li id="M201307280">
- <p>Spyware</em></ins></span> is <span
class="inserted"><ins><em>present in some Android devices when they are
- sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android</em></ins></span> that <span
class="removed"><del><strong>valid? Software</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
- </li>
-
- <li id="M201307250">
- <p>A Motorola phone <a
-
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
- </li>
-
- <li id="M201302150">
- <p>Google Play intentionally sends app</em></ins></span> developers
<span class="removed"><del><strong>have no right</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
-
- <p>Merely asking the “consent” of users is not
enough</em></ins></span> to
- <span class="removed"><del><strong>analyze what</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most</em></ins></span> users <span class="removed"><del><strong>are
doing or how. “Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>have stopped
- reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>spell out what
- they</em></ins></span> are
- <span class="removed"><del><strong>just as wrong as any other
snooping.</p>
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
</li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ <li><p>Gratis</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>“consenting” to. Google should
clearly</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span>
- <span class="inserted"><ins><em>honestly identify</em></ins></span> the
<span class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>information it collects on users, instead of
- hiding it</em></ins></span> in <span class="removed"><del><strong>some
Android devices when they are sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
-
- <p>However,</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send</strong></del></span> <span class="inserted"><ins><em>truly protect
people's privacy, we must prevent Google
- and other companies from getting this</em></ins></span> personal <span
class="removed"><del><strong>data to
Motorola</a>.</p></strong></del></span> <span
class="inserted"><ins><em>information in the
- first place!</p></em></ins></span>
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>phones</em></ins></span>
+ and <span class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a>. (I suspect this means Windows
laptops.) Here is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
+ <p>Spyware</em></ins></span> is present in some Android devices when
they are
+ sold. Some Motorola <span class="removed"><del><strong>phones
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when
this company was owned
+ by Google, use a modified version of</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ <span class="removed"><del><strong>send</strong></del></span>
+ <span class="inserted"><ins><em>sends</em></ins></span> personal data to
Motorola</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Some</strong></del></span>
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
- <span class="inserted"><ins><em><li id="M201111170">
- <p>Some</em></ins></span> manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier <span
class="removed"><del><strong>IQ.</a></p>
+ <span class="inserted"><ins><em><li id="M201307250">
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span
class="inserted"><ins><em>IQ</a>.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file
on</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
+<!-- #SpywareOnMobiles -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span>
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span <span
class="removed"><del><strong>class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
<ul>
- <li><p>The DMCA and the EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing the iOS DRM.</p>
+ <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150">
+ <p>Google Play intentionally sends app developers</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
+
+ <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this.
At</em></ins></span> this
+ <span class="removed"><del><strong>would require circumventing the iOS
DRM.</p>
</li>
- <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
- obvious way <a
+ <li><p>In</strong></del></span> <span
class="inserted"><ins><em>point, most users have stopped
+ reading</em></ins></span> the <span class="removed"><del><strong>latest
iThings system, “turning off” WiFi</strong></del></span> <span
class="inserted"><ins><em>“Terms</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify</em></ins></span> the
+ <span class="removed"><del><strong>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
A more advanced way really does turn them off—only until 5am.
@@ -977,8 +960,26 @@
<li><p>Apple proposes
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is
snooping</strong></del></span> <span
class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ — which would mean no way to use</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
+
+ <p>However,</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information
in</em></ins></span> the <span class="removed"><del><strong>phone is
snooping</strong></del></span>
+ <span class="inserted"><ins><em>first place!</p>
+ </li>
+
+ <li id="M201111170">
+ <p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul class="blurbs">
@@ -1002,25 +1003,15 @@
<span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
- <span class="inserted"><ins><em><li id="M201212031">
- <p>The Electronic Frontier Foundation has examined and
found</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into
it</a>;</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">various
- kinds of surveillance in</em></ins></span> the <span
class="removed"><del><strong>server records these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>Swindle and other
e-readers</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
-
<span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install</strong></del></span>
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report</em></ins></span> even <span class="removed"><del><strong>gratis
apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>which page</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
+ report even which page</em></ins></span> the user <span
class="removed"><del><strong>types into it</a>; the server records these
numbers for</strong></del></span> <span
class="inserted"><ins><em>reads</em></ins></span> at <span
class="removed"><del><strong>least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>what time</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Around 47% of the most
popular iOS</strong></del></span>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1038,14 +1029,20 @@
<ul class="blurbs">
<li id="M201808030">
- <p>Some Google</em></ins></span> apps <span
class="inserted"><ins><em>on Android</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and</strong></del></span>
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's</em></ins></span> location <span
class="removed"><del><strong>information</a></strong></del></span> <span
class="inserted"><ins><em>even when users disable “location
+ record</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>user's
location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other
kinds</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>location
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>it.</p>
+ </li>
+
+ <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>other kinds</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>location
tracking, but most</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>will
be tricked by the misleading control.</p></em></ins></span>
</li>
@@ -1996,8 +1993,8 @@
<p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs recognize and</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are</em></ins></span> watching</a>, <span
class="removed"><del><strong>even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using it
to outsmart
+ what people are</em></ins></span> watching</a>, even <span
class="removed"><del><strong>when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means the manufacturer is
using</strong></del></span> <span
class="inserted"><ins><em>if</em></ins></span> it <span
class="removed"><del><strong>to outsmart
you.</p>
</li>
</ul>
@@ -2009,7 +2006,7 @@
<ul>
<li><p>E-books can contain JavaScript code,
- and</strong></del></span> <span class="inserted"><ins><em>even if it isn't
a TV channel.</p>
+ and</strong></del></span> <span class="inserted"><ins><em>isn't a TV
channel.</p>
</li>
<li id="M201505290">
@@ -2073,12 +2070,12 @@
other government.</p>
<p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time;</strong></del></span> <span class="inserted"><ins><em>be trusted
unless</em></ins></span> it is <span class="removed"><del><strong>possible to
physically remove</strong></del></span> <span class="inserted"><ins><em>done by
free
+ the time;</strong></del></span> <span class="inserted"><ins><em>be trusted
unless</em></ins></span> it is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>done by free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
</li>
@@ -2130,7 +2127,7 @@
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
- <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch to stop this, but any
+ <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
product could spy this way.</p>
<p>Meanwhile, LG TVs <a
@@ -2141,7 +2138,7 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>break security on a “smart”
TV</a></em></ins></span>
+ Crackers found a way to break security on a “smart”
TV</a></em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the
<span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>people who
are watching TV.</p></em></ins></span>
</li>
</ul>
@@ -2215,11 +2212,11 @@
“smart”</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts
and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence of a way to
- disable</strong></del></span>
+ computer,</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not
hidden</strong></del></span> <span class="inserted"><ins><em>product as shipped
doesn't act</em></ins></span> as <span class="inserted"><ins><em>a
- listening device, remote changes to the code could surely
convert</em></ins></span> it
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>product as shipped
doesn't act as</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>code could surely
convert</em></ins></span> it
<span class="inserted"><ins><em>into one.</p>
</li>
@@ -2263,36 +2260,37 @@
<p>The company</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
across devices.</p>
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+ <p>It is possible to turn this off,</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>figure out who the
- user was.</p>
-
- <p>Following</em></ins></span> this <span
class="removed"><del><strong>off, but having it enabled by default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>microphones
<a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media profiles the company
already
+ true,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> it <span
class="removed"><del><strong>enabled by default
+ is an injustice already.</p>
+ </li>
+
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>doesn't really
matter. If it had sold the data to a data
+ broker, the data broker would have been able</em></ins></span> to <span
class="inserted"><ins><em>figure out who</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the company <span class="removed"><del><strong>already
monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>has been ordered to pay a total of
C$4m</a> to its
+ customers.</p>
+ </li>
+
+ <li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way</em></ins></span> to
- <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>access the
data</a> collected</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to
+ <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to access the data</a>
collected</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
<li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the
manufacturer's snooping.</p>
@@ -2397,10 +2395,9 @@
snoops on other devices</strong></del></span> <span
class="inserted"><ins><em>can obey your voice commands without potentially
spying</em></ins></span>
on <span class="removed"><del><strong>the user's local
network.</a></p>
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>you. Even if</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this, but any product
- could spy this way.</p>
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped,</em></ins></span> it
<span class="removed"><del><strong>had installed a patch to stop this, but any
product</strong></del></span> could <span class="removed"><del><strong>spy this
way.</p>
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>is air-gapped, it could be saving up records
+ <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>be saving up records
about you for later examination.</p>
</li>
@@ -2439,7 +2436,7 @@
<span
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
+ <p>This will teach the sheeple</em></ins></span> to <span
class="inserted"><ins><em>find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2451,7 +2448,7 @@
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</em></ins></span> to <span class="inserted"><ins><em>an
unidentified site in</em></ins></span> China</a>.</p>
+ that connects to an unidentified site in</em></ins></span>
China</a>.</p>
<span class="inserted"><ins><em><p>The article says this is a back
door, but that could be a
misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
@@ -2482,20 +2479,21 @@
<p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage to spy through</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ tracked</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>choices of
radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>too</a>.
- Here's information on</strong></del></span> <span
class="inserted"><ins><em>could have got that easily by
+ <p>GM did not get users' consent, but it could have got that easily
by
sneaking it into the contract that users sign for some digital service
or other. A requirement for consent is effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to you,
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>spy
through</strong></del></span> <span class="inserted"><ins><em>you,
watching you, following your movements, tracking passengers' cell
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data.</p>
+ hardware cannot collect any of that data, or that the software
+ is free so we know</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>won't collect any of that data.</p>
</li>
<li id="M201711230">
@@ -2988,7 +2986,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/27 01:58:21 $
+$Date: 2018/10/27 08:28:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- po/proprietary-surveillance.de.po 26 Oct 2018 06:58:57 -0000 1.238
+++ po/proprietary-surveillance.de.po 27 Oct 2018 08:28:53 -0000 1.239
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -549,11 +549,21 @@
"vermarktet diese nun an andere Unternehmen."
#. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"Um Windows 10â Installationsbasis zu steigern: Microsoft <a href=\"https://"
"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
@@ -1726,13 +1736,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://"
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Spyware in many e-readers—not only the Kindle: <a href=\"https://www."
"eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
"user reads at what time</a>."
@@ -3763,7 +3766,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.331
retrieving revision 1.332
diff -u -b -r1.331 -r1.332
--- po/proprietary-surveillance.fr.po 26 Oct 2018 11:45:30 -0000 1.331
+++ po/proprietary-surveillance.fr.po 27 Oct 2018 08:28:53 -0000 1.332
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-26 13:44+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -418,11 +419,21 @@
"société."
#. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"Afin d'élargir la base installée de Windows 10, Microsoft <a
href=\"https://"
"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
@@ -1312,16 +1323,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://"
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-"L'<cite>Electronic Frontier Foundation</cite> a mis en évidence <a href="
-"\"https://www.eff.org/pages/reader-privacy-chart-2012\">différents "
-"mécanismes de surveillance dans le Swindle et autres liseuses</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Spyware in many e-readers—not only the Kindle: <a href=\"https://www."
"eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
"user reads at what time</a>."
@@ -3085,9 +3086,17 @@
"de ce type doit être interdit."
#. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
"Mais si vous voulez être vraiment en sécurité, vous devez vous assurer que
"
"le matériel de la voiture ne peut collecter aucune de ces données."
@@ -3635,3 +3644,12 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Electronic Frontier Foundation has examined and found <a href="
+#~ "\"https://www.eff.org/pages/reader-privacy-chart-2012\">various kinds of "
+#~ "surveillance in the Swindle and other e-readers</a>."
+#~ msgstr ""
+#~ "L'<cite>Electronic Frontier Foundation</cite> a mis en évidence <a href="
+#~ "\"https://www.eff.org/pages/reader-privacy-chart-2012\">différents "
+#~ "mécanismes de surveillance dans le Swindle et autres liseuses</a>."
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- po/proprietary-surveillance.it-diff.html 26 Oct 2018 06:58:57 -0000
1.79
+++ po/proprietary-surveillance.it-diff.html 27 Oct 2018 08:28:53 -0000
1.80
@@ -273,7 +273,7 @@
</li>
<li id="M201608171">
- <p>In</em></ins></span> order to increase Windows 10's install base,
Microsoft <a
+ <p>In</em></ins></span> order to increase Windows 10's install base,
Microsoft <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>privacy</a>.</p></em></ins></span>
</li>
@@ -476,7 +476,12 @@
that Apple has not talked about</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p><a</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms to Apple.</p>
+ </li>
+</ul>
+
+<p>There's a lot more</strong></del></span>
<span class="inserted"><ins><em><li id="M201410200">
<p>Various operations in <a
@@ -485,14 +490,14 @@
</li>
<li id="M201401101">
- <p><a</em></ins></span>
+ <p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
</li>
</ul>
-<p>There's a lot more <a href="#SpywareIniThings">iThing
spyware</a>, and
+<p>There's a lot more</em></ins></span> <a
href="#SpywareIniThings">iThing spyware</a>, and
<a href="/proprietary/malware-apple.html">Apple
malware</a>.</p>
@@ -566,21 +571,21 @@
<li>
<p>Pairs of Android apps</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>collude</strong></del></span> <span
class="inserted"><ins><em>take over
+ href="http://www.bbc.com/news/uk-34444233">agencies</em></ins></span>
can <span class="removed"><del><strong>collude to transmit users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>take over
smartphones</a> by sending hidden text messages which enable
- them</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
- data</strong></del></span> <span class="inserted"><ins><em>turn the
phones on and off, listen</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ them</em></ins></span> to <span class="removed"><del><strong>servers.
<a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
tens of thousands of pairs that collude</a>.</p>
</li>
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>phones on and
off, listen to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
text messages, read call, location and web browsing history, and
- read</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>contact list. This
malware</em></ins></span> is <span class="removed"><del><strong>not
enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ read the contact list. This malware</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this.
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
from investigation.</p>
</li>
@@ -594,38 +599,22 @@
the <span class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> that <span
class="removed"><del><strong>spell out
what they</strong></del></span> <span class="inserted"><ins><em>we know nearly
all portable
phones have. It may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify the information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em><a
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>hiding it in
an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal
information</strong></del></span> <span
class="inserted"><ins><em>bugs</em></ins></span> in the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>phones'
radio software</a>.</p></em></ins></span>
+ lots of bugs in</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
+ <li id="M201307000">
+ <p>Portable phones with GPS <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+ will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>users, instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>remote
command, and users cannot stop
+ them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>in an obscurely worded EULA.</p>
- <span class="inserted"><ins><em><li id="M201307000">
- <p>Portable phones with GPS</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send</em></ins></span> their <span
class="removed"><del><strong>permission</a>.</p>
-
- <p>Even if you disable Google Maps and</strong></del></span> <span
class="inserted"><ins><em>GPS</em></ins></span> location <span
class="removed"><del><strong>tracking, you must
- disable Google Play itself to completely</strong></del></span> <span
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span>
stop <span class="removed"><del><strong>the tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
- <span class="inserted"><ins><em>them</a>. (The US says it will
eventually require all new portable phones</em></ins></span>
- to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such a thing would be almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p></em></ins></span>
+<p>However,</strong></del></span> <span class="inserted"><ins><em>will
eventually require all new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
</li>
-
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps
- <a href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -635,33 +624,55 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>other companies from getting</strong></del></span>
<span class="inserted"><ins><em>the EU Copyright Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr…apps spy on users</a>,
because</em></ins></span>
+ this <span class="removed"><del><strong>personal information
in</strong></del></span> <span class="inserted"><ins><em>would require
circumventing</em></ins></span> the <span class="removed"><del><strong>first
+place!</p></strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In</em></ins></span> the <span
class="removed"><del><strong>users' movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>latest iThings system,
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
+ yet another example of nonfree software pretending to obey the user,
+ when it's actually doing something else. Such a thing would be almost
+ unthinkable with free software.</p>
+
</li>
- <li><p>“Cryptic communication,” unrelated
to</strong></del></span> the <span class="removed"><del><strong>app's
functionality,
- was</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ <li><p>More than 73% of the most popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,” unrelated to the
app's functionality,
+ was</strong></del></span> <span class="inserted"><ins><em>obvious
way</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear
way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>say
+ “free”—they are not free software. The
clear</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>. A more advanced</em></ins></span>
way <span class="removed"><del><strong>to say
“zero price” is “gratis.”</p>
- <p>The article takes for granted that</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>really does turn
+ them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>iOS DRM.</p></em></ins></span>
+ just as wrong as any other snooping.</p>
</li>
- <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
+ on the average.</p>
</li>
<li><p>Spyware is present in some Android devices when they are
sold.
Some Motorola phones modify Android to
@@ -669,15 +680,13 @@
send personal data to Motorola</a>.</p>
</li>
- <li><p>Some manufacturers add a</strong></del></span> <span
class="inserted"><ins><em>obvious way</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <li><p>Some manufacturers add a
+ <a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
+ Samsung's back door</a> provides access</strong></del></span>
<span class="inserted"><ins><em>you—“We
know you want</em></ins></span> to <span class="removed"><del><strong>any
file on the system.</p></strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -726,10 +735,7 @@
days.</p>
</li>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509240">
- <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
without giving a valid email address and receiving the code Apple
sends to it.</p>
</li>
@@ -740,7 +746,10 @@
behavioral and location information</a> of their users with third
parties.</p>
</li>
- <li><p>iThings automatically upload to Apple's servers
all</strong></del></span> <span class="inserted"><ins><em>Apple's servers
all</em></ins></span> the photos
+ <li><p>iThings</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509240">
+ <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -1027,23 +1036,17 @@
needed to check DRM!</p>
</li>
- <li id="M201212031">
- <p>The Electronic Frontier Foundation has examined and found <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012">various
- kinds of surveillance</em></ins></span> in the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>Swindle</em></ins></span> and <span
class="inserted"><ins><em>other e-readers</a>.</p>
- </li>
-
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>server accounts, it can
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>phone, and in server accounts, it can
alter them too</a>.
</p></li>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+ <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
- <p>This example illustrates how “getting the user's
consent”
+ <p>This example illustrates how
“getting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page</em></ins></span> the <span
class="removed"><del><strong>user's consent”
for surveillance is inadequate as a protection against massive
surveillance.</p>
</li>
@@ -1118,31 +1121,30 @@
<li><p>Like most “music screaming” disservices,
Spotify
is based</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>malware (DRM and snooping). In
August
+ detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>malware
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
+
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that</strong></del></span> <span
class="inserted"><ins><em>apps whose
- source code</em></ins></span> they <span
class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>cannot look at. The other apps might
be</em></ins></span> snooping <span class="removed"><del><strong>as a way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span>
- <span class="inserted"><ins><em>in other ways.</p>
-
- <p>This</em></ins></span> is <span class="removed"><del><strong>a
typical example of
- the attitude</strong></del></span> <span
class="inserted"><ins><em>evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid</em></ins></span> of the proprietary <span
class="removed"><del><strong>software industry towards
+ demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="inserted"><ins><em>proprietary software—both proprietary
+ Android by</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way</strong></del></span>
<span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is a typical example of
+ the attitude of</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
+ and</em></ins></span> the proprietary <span
class="removed"><del><strong>software industry towards
those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
</li>
- <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the</em></ins></span> proprietary apps <span
class="removed"><del><strong>for mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em>by
getting</em></ins></span> apps <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>user has
+ <li><p>Many proprietary</strong></del></span> apps <span
class="removed"><del><strong>for mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em>by
getting</em></ins></span> apps <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>user has
installed.</strong></del></span> <span class="inserted"><ins><em>free
software
only</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
is doing this in a way</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="removed"><del><strong>at
least is visible and
@@ -1173,17 +1175,60 @@
other but not to the server's database.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>moviepass</em></ins></span> app <span
class="removed"><del><strong>because it asked the user to
- approve sending personal data to the app developer but did not
- ask about sending it to other companies. This shows the
- weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free software flashlight
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201803050">
+ <p>The moviepass</em></ins></span> app
+ <span class="removed"><del><strong><a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</strong></del></span>
<span class="inserted"><ins><em>and dis-service
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p>
+ </li>
+
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store</em></ins></span> by
<span
class="removed"><del><strong>companies.</a></p></strong></del></span>
<span class="inserted"><ins><em>noticing WiFi
+ networks</a>.</p>
+ </li>
+
+ <li id="M201708270"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Sarahah</em></ins></span> app <span
class="removed"><del><strong>because it asked</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>zero price.</p>
+ </li>
+
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>the app developer but</strong></del></span>
<span class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google</em></ins></span> did not
+ <span class="removed"><del><strong>ask about
sending</strong></del></span> <span class="inserted"><ins><em>intend to make
these apps spy; on the contrary,</em></ins></span> it
+ <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="removed"><del><strong>other companies. This
shows</strong></del></span> <span class="inserted"><ins><em>prevent that, and
deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
+
+ <p>On</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
+ to <span class="removed"><del><strong>anyone? A free software flashlight
app would not.</p>
</li>
</ul>
@@ -1195,19 +1240,23 @@
</div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about them to
- nVidia servers</a>.</p>
+ <li><p>nVidia's</strong></del></span> <span
class="inserted"><ins><em>inspect executable</em></ins></span> proprietary
<span class="removed"><del><strong>GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
</li>
<li><p>Angry Birds
<a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span> and <span
class="removed"><del><strong>the NSA takes advantage to</strong></del></span>
<span class="inserted"><ins><em>dis-service</em></ins></span>
- spy <span class="removed"><del><strong>through it too</a>.
- Here's information</strong></del></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>users even</em></ins></span> more <span
class="removed"><del><strong>spyware apps</a>.</p>
+ spies</strong></del></span> <span class="inserted"><ins><em>see what
they do.</p>
+
+ <p>Google could demand the source code</em></ins></span> for <span
class="removed"><del><strong>companies,</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="inserted"><ins><em>study</em></ins></span>
+ the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>source code
somehow</em></ins></span> to <span class="removed"><del><strong>spy
through</strong></del></span> <span class="inserted"><ins><em>determine whether
they mistreat users in
+ various ways. If</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>did a good job of this, it
could</em></ins></span> more <span class="removed"><del><strong>spyware
apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA</strong></del></span> <span class="inserted"><ins><em>or
less
+ prevent such snooping, except when the</em></ins></span> app <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
@@ -1219,173 +1268,126 @@
<ul>
<li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span> <span class="inserted"><ins><em>than users
expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> a <span
class="removed"><del><strong>speech recognition company
based</strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
-
- <p>Don't be tracked—pay cash!</p>
- </li>
-
- <li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>the U.S.</p>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>developers
are clever
+ enough</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
+ a speech recognition company based in the U.S.</p>
- <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>popular Android
apps
- is pervasive and sometimes very clever. Some trackers</em></ins></span>
can <span class="removed"><del><strong>remotely control the toys
with</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>mobile
phone. This would
- enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>user's movements around</em></ins></span> a <span
class="removed"><del><strong>child's speech,</strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
- networks</a>.</p>
- </li>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
- <li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>even speak
- into</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></em></ins></span>
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak
+ into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span>
+ <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>A computerized vibrator</strong></del></span>
- <span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ <span class="inserted"><ins><em><li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
was snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
-
- <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>its users through</strong></del></span>
the <span class="removed"><del><strong>proprietary control
app</a>.</p>
+ <span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</em></ins></span>
+ on <span class="removed"><del><strong>its users through the proprietary
control app</a>.</p>
- <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>contrary, it
- worked in various ways to prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
-
- <p>On</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ <p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>other hand, Google redistributes nonfree Android
apps, and
- therefore shares in</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+ body), as well as the vibration frequency.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>responsibility for</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements
about</strong></del></span> <span class="inserted"><ins><em>injustice
of</em></ins></span> their <span class="removed"><del><strong>products, rather
than free software which users could have
- checked and changed.</p>
-
- <p>The company that made the vibrator</strong></del></span> <span
class="inserted"><ins><em>being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people used it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</strong></del></span> <span class="inserted"><ins><em>preventing apps from
- cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
- to <span class="removed"><del><strong>a
- data broker, the data broker would have been able</strong></del></span>
<span class="inserted"><ins><em>inspect executable proprietary
apps</em></ins></span> to <span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>see what they
do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>source code for these apps, and
study</em></ins></span>
- the <span class="removed"><del><strong>company has been
ordered</strong></del></span> <span class="inserted"><ins><em>source code
somehow</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
- various ways. If it did</em></ins></span> a <span
class="removed"><del><strong>total</strong></del></span> <span
class="inserted"><ins><em>good job</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span> <span
class="inserted"><ins><em>this, it could more or less
- prevent such snooping, except when</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span class="inserted"><ins><em>app
developers are clever
- enough</em></ins></span> to <span class="removed"><del><strong>access the
data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</em></ins></span> to <span class="removed"><del><strong>these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>protect us. We
must demand release of source code</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>the
- public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>children and
adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>each other.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS:</strong></del></span>
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART <a
-
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
- on users</a>.</p>
+ <p>With</em></ins></span> free software <span
class="removed"><del><strong>which</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> users could <span
class="removed"><del><strong>have
+ checked and changed.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
+ <p>The company</strong></del></span> <span
class="inserted"><ins><em><em>make sure</em></em></ins></span> that
<span class="removed"><del><strong>made the vibrator</strong></del></span>
<span class="inserted"><ins><em>they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging by <a
-
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ <p>Faceapp appears to do</em></ins></span> lots of <span
class="removed"><del><strong>personal information about</strong></del></span>
<span class="inserted"><ins><em>surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"></em></ins></span>
+ how
+ <span class="removed"><del><strong>people used it</a>.</p>
+
+ <p>The company's statement that</strong></del></span> <span
class="inserted"><ins><em>much access</em></ins></span> it <span
class="removed"><del><strong>was anonymizing the</strong></del></span> <span
class="inserted"><ins><em>demands to personal</em></ins></span> data <span
class="removed"><del><strong>may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>data to</strong></del></span> <span
class="inserted"><ins><em>device</a>.</p>
</li>
<li id="M201704190">
<p>Users are suing Bose for <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
- along with the headphone's unique serial number.</p>
+ distributing</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>spyware app for its headphones</a>.
Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>data broker</strong></del></span>
<span class="inserted"><ins><em>app</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>record the names of the audio files users
listen</em></ins></span> to <span class="removed"><del><strong>figure out
+ who</strong></del></span>
+ <span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
- <p>The suit accuses that this was done without the users' consent.
+ <p>The suit accuses that</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>was done without the users' consent.
If the fine print of the app said that users gave consent for this,
- would that</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design</em></ins></span>
+ the <span class="removed"><del><strong>company has been
ordered</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p>
</li>
<li id="M201704074">
- <p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
-
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens of thousands of pairs that collude</a>.</p>
+ <p>Pairs</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>Android apps can collude</em></ins></span>
+ to <span class="removed"><del><strong>its customers.</p>
+ </li>
+
+ <li><p> “CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to
<span class="removed"><del><strong>the
+ manufacturer</a>. Guess what?</strong></del></span> <span
class="inserted"><ins><em>servers.</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study</em></ins></span> found <span class="removed"><del><strong>a way to
access the data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>tens
of thousands of pairs that collude</a>.</p>
</li>
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
+ on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span class="inserted"><ins><em>same
information
+ about</em></ins></span> the <span
class="removed"><del><strong>manufacturer and</strong></del></span> <span
class="inserted"><ins><em>users' searches that Google normally gets when they
use
its search engine.</p>
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
+ <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>FBI could listen to these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>,</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
- still spyware.</p>
+ still spyware.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201701210">
+ <span class="inserted"><ins><em><li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user data</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection --></strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -1545,12 +1547,9 @@
<li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>100 <a
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs,</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware</strong></del></span> <span
class="inserted"><ins><em>the average.</p>
+ and advertising</a> URLs, on the average.</p>
</li>
<li id="M201504060">
@@ -1569,7 +1568,7 @@
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that</em></ins></span> at <span
class="removed"><del><strong>Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>least is visible and optional</a>. Not
+ is doing this in a way that at least is visible and optional</a>. Not
as bad as what the others do.</p>
</li>
@@ -1609,12 +1608,11 @@
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
+ <h4 id="SpywareInSkype">Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear:
left;"></div></strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201307110">
<p>Skype contains <a
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
@@ -1622,33 +1620,28 @@
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInGames">Games</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
+ <h4 id="SpywareInGames">Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers</em></ins></span> and <span
class="inserted"><ins><em>sends it to third parties</a>.</p>
+ is found in many proprietary games. It <a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data on users' computers and sends it to third
parties</a>.</p>
</li>
<li id="M201804144">
- <p>ArenaNet surreptitiously installed a</em></ins></span> spyware
<span class="removed"><del><strong>via BIOS</a></strong></del></span>
- <span class="inserted"><ins><em>program along with an update to the massive
+ <p>ArenaNet surreptitiously installed a spyware
+ program along with an update to the massive
multiplayer game Guild War 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>all open processes
running on its user's computer</a>.</p>
+ to snoop on all open processes running on its user's
computer</a>.</p>
</li>
<li id="M201711070">
@@ -1673,14 +1666,12 @@
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks</em></ins></span>
that <span class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>data
+ <p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>lot of
money. They also
+ “whales” who can be led to spend a lot of money. They also
use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
@@ -1702,15 +1693,9 @@
<li id="M200510200">
<p>Blizzard Warden is a hidden
- “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's computer and
sniffs a
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies on every process running on a gamer's computer and sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
</li>
@@ -1719,87 +1704,42 @@
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
- <li><p>Investigation
- Shows</strong></del></span>
-
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>people that use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
+ <p>It is unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
-</div>
-
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+</ul></em></ins></span>
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>me and
-said, “Didn't I see you</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInBIOS">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInTVSets">TV Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<ul>
- <li>
- <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you on television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
-before Amazon</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs.</p>
+before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>“off.”</p>
- <p>A</strong></del></span> <span class="inserted"><ins><em>presents.
It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
@@ -1807,117 +1747,77 @@
</li>
<li id="M201702060">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>device means</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>coming from the user's own computer,
- the TV reports what</em></ins></span> it <span
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>disable the
+ cable</a>. Even if the image is coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p></em></ins></span>
+ does not legitimize the surveillance.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201511130">
+ <li id="M201511130">
<p>Some web and TV advertisements play inaudible
sounds to be picked up by proprietary malware running
- on other devices</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
+ on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>contain Javascript code,</strong></del></span>
<span class="inserted"><ins><em>correlate ads with Web
activity,</em></ins></span> and <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p></em></ins></span>
+ your TV, advertisers can correlate ads with Web activity, and other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511060">
+ <li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ manufacturers in spying on their users: their <a
+
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
- is an injustice already.</p></em></ins></span>
+ <p>It is possible to turn this off, but having it enabled by default
+ is an injustice already.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-<ul>
-<li><p>Computerized cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511020">
- <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>nonfree software</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
+ <li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
to the 600 millions social media profiles the company
- already monitors. Tivo customers</em></ins></span> are <span
class="inserted"><ins><em>unaware they're
+ already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p></em></ins></span>
+ users to new combined surveillance by default.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201507240">
+ <li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
<li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
record</a>.</p>
</li>
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
- users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> when
- <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>first sold.</p>
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to the US or some
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
- access. The</strong></del></span> <span class="inserted"><ins><em>trusted
unless it is done by free</em></ins></span>
- software in <span class="removed"><del><strong>the
car</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
+ <p>Speech recognition is not to be trusted unless it is done by free
+ software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
@@ -1926,264 +1826,327 @@
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV</em></ins></span> is
- <span class="removed"><del><strong>proprietary,</strong></del></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
<li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their</em></ins></span> users</a>.</p>
+ on their users</a>.</p>
- <span class="removed"><del><strong><p>Even if no one
connects</strong></del></span>
-
- <span class="inserted"><ins><em><p>The report was as of 2014, but we
don't expect this has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to
<span class="inserted"><ins><em>get users' formal
+ <p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ And what happens if a user declines consent? Probably the TV will
+ say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>physically remove</strong></del></span>
<span class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span>
- <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
+ <p>Proper laws would say that TVs are not allowed to report what the
+ user watches—no exceptions!</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software</strong></del></span> <span
class="inserted"><ins><em>id="M201405200">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span> <span
class="inserted"><ins><em>LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but the invasion isn't done by malware. The other
- cases mentioned are done by proprietary malware in the
car.</p></li>
+ <li id="M201405200">
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
- <li><p>Tesla cars allow</strong></del></span>
+<ul>
+<li><p></strong></del></span> <span class="inserted"><ins><em>LG
“smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>user
watches,</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store</strong></del></span> <span class="inserted"><ins><em>switch to
turn</em></ins></span> this <span class="removed"><del><strong>information, but
if</strong></del></span> <span class="inserted"><ins><em>off has
- no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
- really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data
- <span class="removed"><del><strong>and hand</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
-
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the switch to turn
this off has
+ no effect</a>. (The fact</em></ins></span> that the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>transmission reports</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is
not</strong></del></span> <span class="inserted"><ins><em>404
error</em></ins></span>
+ really
+<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>means nothing; the server could save that data
anyway.)</p>
+
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
- <p>LG later said it had installed a patch to stop this, but any
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+
+ <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
-<!-- #SpywareAtHome -->
+
+<!-- #SpywareOnTheRoad -->
<!-- WEBMASTERS: make sure</strong></del></span>
<span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>a
“smart” TV</a>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
and use its camera to watch the people who are watching TV.</p>
</li>
</ul></em></ins></span>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span>
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603220">
- <p>Over 70 brands</em></ins></span> of <span
class="removed"><del><strong>data about the
user</a>.</p></strong></del></span> <span
class="inserted"><ins><em>network-connected surveillance cameras have <a
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511250">
+ <li id="M201511250"></em></ins></span>
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using
it</em></ins></span>
- to <span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips
made</strong></del></span>
+<span class="removed"><del><strong><ul>
+ <li><p>E-books can contain Javascript code,
+ and</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act
as</em></ins></span> a <span class="removed"><del><strong>woman came
up</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently
that</strong></del></span> <span class="inserted"><ins><em>code could surely
convert it
- into one.</p>
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
+ into one.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
</li>
+</ul>
- <li id="M201711100">
- <p>A remote-control sex toy</em></ins></span> was
-<span class="removed"><del><strong>before Amazon “smart”
TVs.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>found to make</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if</strong></del></span>
+<li><p>Computerized cars with nonfree software
are</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
+ recordings of the conversation between two
users</a>.</p></em></ins></span>
</li>
- <li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through</em></ins></span> the <span
class="removed"><del><strong>user's own
- computer,</strong></del></span> <span
class="inserted"><ins><em>proprietary control app</a>.</p>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201703140">
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</em></ins></span> its <span
class="removed"><del><strong>computers remotely and make changes in various
+ settings</a>.</p>
- <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span> <span
class="inserted"><ins><em>temperature</em></ins></span> of <span
class="removed"><del><strong>a way to
- disable</strong></del></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it was <span
class="removed"><del><strong>in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>surrounded by a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
- </li>
+ <p>That's easy to do because the system has no authentication when
+ accessed</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on</strong></del></span> <span class="inserted"><ins><em>vibration
frequency.</p>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
+ body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements
about</em></ins></span> their <span
class="removed"><del><strong>users</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>products, rather than free software which
users could have checked
- and changed.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>report was as of 2014, but
we don't expect this has got better.</p>
+ standard with which manufacturers would make statements about their
+ products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
+ and changed.</p>
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
- consent before</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+ <p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for</em></ins></span> collecting <span
class="inserted"><ins><em>lots of</em></ins></span> personal <span
class="inserted"><ins><em>information about how people
+ was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing
the</em></ins></span> data <span class="removed"><del><strong>are totally
inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>may be
- true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
- user <span class="removed"><del><strong>watches — no
exceptions!</p>
+ <p>The company's statement that it was anonymizing</em></ins></span>
the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span class="inserted"><ins><em>data may be
+ true, but</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
+ the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span class="inserted"><ins><em>its
+ customers.</p></em></ins></span>
</li>
- <li><p>Vizio goes a step further than other TV manufacturers in
spying on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>was.</p>
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
- <p>It is possible</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having it enabled by default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a> to its
- customers.</p></em></ins></span>
- </li>
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
- <span class="removed"><del><strong><li><p>Tivo's
alliance</strong></del></span>
+ <li><p>Tesla cars allow</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>microphones
<a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to the <span
class="removed"><del><strong>600 millions social media profiles the company
already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way</em></ins></span> to
- <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>access the
data</a> collected</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>the
- manufacturer's snooping.</p>
-
- <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could
listen</em></ins></span> to <span class="removed"><del><strong>be
- picked up</strong></del></span> <span class="inserted"><ins><em>these
- conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>proprietary malware running on other devices in
- range so as to determine that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p></em></ins></span>
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ conversations was unacceptable by itself.</p>
</li>
- <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="inserted"><ins><em>i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>,</em></ins></span> a
<span class="removed"><del><strong>TV channel.</p></strong></del></span>
<span class="inserted"><ins><em>speech recognition
- company based in the U.S.</p>
+ <li id="M201612060">
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
+ company <span class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p></em></ins></span>
+ crackers</em></ins></span> to <span class="removed"><del><strong>get the
data</strong></del></span> <span class="inserted"><ins><em>listen in on a
child's speech,</em></ins></span> and <span class="removed"><del><strong>hand
it over,</strong></del></span> <span class="inserted"><ins><em>even speak
into</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send</strong></del></span>
<span class="inserted"><ins><em><li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching</strong></del></span>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about the user</a>.</p>
+ </li>
+
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p></em></ins></span>
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>the internet</strong></del></span>
<span class="inserted"><ins><em>you</a>.</p>
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that</strong></del></span> <span
class="inserted"><ins><em>people, DJI</em></ins></span> is <span
class="removed"><del><strong>viewed</strong></del></span> <span
class="inserted"><ins><em>in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer, the TV reports what it is. The existence
of</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
</li>
</ul>
@@ -2194,69 +2157,82 @@
<ul class="blurbs">
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon
device,</em></ins></span>
- and <span class="removed"><del><strong>would then have to
- give</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
-
- <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the US <span class="removed"><del><strong>or some other
government.</p>
- <p>Speech recognition is not to be trusted unless it is done
- by free software in your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span>
- <span class="inserted"><ins><em>told Amazon to do this, or cease to sell
the product in</em></ins></span> that <span class="inserted"><ins><em>country,
- do you think Amazon would have the moral fiber to say no?</p>
-
- <p>These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking”</em></ins></span> to
- <span class="removed"><del><strong>third
parties</a>.</p></strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
+ <p>Crackers found</em></ins></span> a way to
+ <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as it was in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon
device,
+ and</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+
+ <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
+
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
<span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what
the</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its</em></ins></span>
user <span class="removed"><del><strong>watches, and</strong></del></span>
<span class="inserted"><ins><em>by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>its user by
+ sending usage data back over the Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart” products are designed <a
+ <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>products are
designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>turn this
off has no effect. (The fact that</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>server
- could save</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listen to everyone</em></ins></span> in <span
class="removed"><del><strong>detail and
+ link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</strong></del></span> <span
class="inserted"><ins><em>can obey your voice commands without potentially
spying</em></ins></span>
- on <span class="removed"><del><strong>the user's local
network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped,</em></ins></span> it
<span class="removed"><del><strong>had installed a patch to stop this, but any
product</strong></del></span> could <span class="removed"><del><strong>spy this
way.</p>
+ a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track you
+ across devices.</p>
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>be saving up records
- about you for later examination.</p>
+ <p>It is possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
+ on you. Even if</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
- <li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>data about the
user</a>.</p></em></ins></span>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
+ data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201310260"></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>what programs</strong></del></span> <span
class="inserted"><ins><em>their renters</a>.</p>
+ <li id="M201310260">
+ <p><a
+
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
</li>
</ul>
@@ -2270,108 +2246,148 @@
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often</em></ins></span> people <span
class="removed"><del><strong>watch, and even</strong></del></span> <span
class="inserted"><ins><em>wear it</a>.</p>
+ monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
- monitor every aspect of</em></ins></span> what they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
+ monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads with Web activity, and
+ other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span> <span
class="inserted"><ins><em>do.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Vizio
“smart” TVs recognize and</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ <p>The article says this is</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p></strong></del></span> <span
class="inserted"><ins><em>back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
- <li id="M201407090">
- <p>An LG “smart” watch is designed <a
-
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>report its location to someone else and to
transmit conversations
+ <span class="inserted"><ins><em><li id="M201407090">
+ <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else</em></ins></span> and <span
class="removed"><del><strong>listening all the
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>to transmit conversations
too</a>.</p></em></ins></span>
</li>
-</ul>
-
-<span class="removed"><del><strong><!-- #SpywareAtPlay
--></strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtPlay">Spyware at
Play</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInVehicles">Vehicles</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtPlay">#SpywareAtPlay</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
-<li><p>Users are suing Bose for</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201810230">
- <p>GM</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing a spyware app for its headphones</a>.
-Specifically, the app would record</strong></del></span>
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>choices</em></ins></span> of <span
class="removed"><del><strong>the audio files
-users listen to along with the headphone's unique serial number.
-</p>
-
-<p>The suit accuses that this was done without the</strong></del></span>
<span class="inserted"><ins><em>radio programs</a> in its
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get</em></ins></span> users' <span
class="removed"><del><strong>consent.
-If the fine print of</strong></del></span> <span
class="inserted"><ins><em>consent, but it could have got that easily by
- sneaking it into</em></ins></span> the <span
class="removed"><del><strong>app said</strong></del></span> <span
class="inserted"><ins><em>contract</em></ins></span> that users <span
class="removed"><del><strong>gave consent</strong></del></span> <span
class="inserted"><ins><em>sign</em></ins></span> for <span
class="removed"><del><strong>this,
-would that make it acceptable? No way! It</strong></del></span> <span
class="inserted"><ins><em>some digital service
- or other. A requirement for consent is effectively no protection.</p>
-
- <p>The cars can also collect lots of other data: listening to you,
- watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection</em></ins></span>
should be <span class="removed"><del><strong>flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
-
- <p>But if you really want</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure</em></ins></span> the
<span class="removed"><del><strong>app to snoop at all</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>car's
- hardware cannot collect any of that data.</p></em></ins></span>
- </li>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
+ watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
+ that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
+ phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
+
+ <p>But if you really want</em></ins></span> to
+ <span class="removed"><del><strong>third parties</a>.</p>
+ </li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
+ hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
+ transmission reports a 404 error really means nothing; the server
+ could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
+ is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this,
but</strong></del></span> <span class="inserted"><ins><em>won't
collect</em></ins></span> any <span class="removed"><del><strong>product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span>
<span class="inserted"><ins><em><li id="M201711230">
- <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ <p>AI-powered driving apps can <a
+
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201607160">
- <p>Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+<li><p>Users</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607160">
+ <p>Computerized cars with nonfree software</em></ins></span> are
<span class="removed"><del><strong>suing Bose for</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
<li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has a built-in
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>make changes in various
+ access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
+Specifically, the app would record the names of the audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication
- when accessed through the modem. However, even if it asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
+ <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
+</p>
+
+<p>The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>do
because</em></ins></span> the <span class="removed"><del><strong>fine print
of</strong></del></span> <span class="inserted"><ins><em>system has no
authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>modem.
However, even if</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It
should</strong></del></span> <span class="inserted"><ins><em>asked
+ for authentication, you couldn't</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>confident that Nissan
+ has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car remotely, the cell phone modem
+ <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
+</p>
+</li>
+
+ <li><p>Many
+ <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the
cell phone modem
enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track the car's movements all</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
@@ -2774,7 +2790,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- po/proprietary-surveillance.it.po 26 Oct 2018 06:58:57 -0000 1.251
+++ po/proprietary-surveillance.it.po 27 Oct 2018 08:28:53 -0000 1.252
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -565,11 +565,21 @@
"sua volta le invia ad altre aziende."
#. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"Per aumentare il numero di installazioni di Windows 10, Microsoft <a href="
"\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
@@ -1648,13 +1658,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://"
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Spyware in many e-readers—not only the Kindle: <a href=\"https://www."
"eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
"user reads at what time</a>."
@@ -3462,7 +3465,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- po/proprietary-surveillance.ja-diff.html 26 Oct 2018 06:58:57 -0000
1.90
+++ po/proprietary-surveillance.ja-diff.html 27 Oct 2018 08:28:53 -0000
1.91
@@ -269,7 +269,7 @@
</li>
<li id="M201608171">
- <p>In</em></ins></span> order to increase Windows 10's install base,
Microsoft <a
+ <p>In</em></ins></span> order to increase Windows 10's install base,
Microsoft <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>privacy</a>.</p></em></ins></span>
</li>
@@ -933,18 +933,12 @@
<span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
- <span class="inserted"><ins><em><li id="M201212031">
- <p>The Electronic Frontier Foundation has examined and
found</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">various
- kinds of</em></ins></span> surveillance <span
class="removed"><del><strong>software snoop on what radio</strong></del></span>
<span class="inserted"><ins><em>in the Swindle</em></ins></span> and <span
class="removed"><del><strong>TV programs
- are playing nearby</a>. Also on</strong></del></span> <span
class="inserted"><ins><em>other e-readers</a>.</p>
- </li>
-
- <li id="M201212030">
- <p>Spyware in many e-readers—not only the Kindle: <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>users post</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ <span class="inserted"><ins><em><li id="M201212030">
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
+ report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>radio and TV programs
+ are playing nearby</a>. Also</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
</ul>
@@ -963,10 +957,10 @@
<ul class="blurbs">
<li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>Android <a
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+ record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>disable “location
tracking”</a>.</p>
<p>There are other ways to turn off the other kinds of location
@@ -984,29 +978,31 @@
the <span class="removed"><del><strong>picture you take according to who
is in</strong></del></span> <span class="inserted"><ins><em>user's
movements and listens through</em></ins></span> the <span
class="removed"><del><strong>frame.</p></strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p></em></ins></span>
- <p>This <span class="removed"><del><strong>spyware feature seems to
require online access to some
- known-faces database, which means the pictures are
likely</strong></del></span> <span class="inserted"><ins><em>makes them act as
spies for licensing enforcement.</p>
+ <p>This <span class="removed"><del><strong>spyware feature seems to
require online access</strong></del></span> <span
class="inserted"><ins><em>makes them act as spies for licensing
enforcement.</p>
- <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="inserted"><ins><em>save
- a recording. But I can't</em></ins></span> be
- <span class="removed"><del><strong>sent across</strong></del></span>
<span class="inserted"><ins><em>sure from</em></ins></span> the <span
class="removed"><del><strong>wire to Facebook's servers and face-recognition
- algorithms.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p></em></ins></span>
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If <span class="removed"><del><strong>so,
none</strong></del></span> <span class="inserted"><ins><em>you learn to care
much less about sports, you will benefit in
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>be
+ sent across</strong></del></span> <span class="inserted"><ins><em>care
much less about sports, you will benefit in
many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>5,855 Android apps
studied by researchers were found</em></ins></span> to <span
class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>service.</p>
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users'
pictures are private
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="removed"><del><strong>the
service.</p>
</li>
<li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>apps were
- found to insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
+ is based</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>malware
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
@@ -1015,9 +1011,9 @@
their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some
- are starting</strong></del></span>
- <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
+ demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span
class="removed"><del><strong>submit</strong></del></span>
+ <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
+ are starting to realize that it is nasty.</p>
<p>This article shows</strong></del></span> <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="inserted"><ins><em>proprietary software—both proprietary
Android by</em></ins></span> <a
@@ -1061,15 +1057,16 @@
other but not to the server's database.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
- <span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass</em></ins></span> app
- <span class="removed"><del><strong><a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</strong></del></span>
<span class="inserted"><ins><em>and dis-service
+ <span class="inserted"><ins><em><li id="M201803050"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>moviepass</em></ins></span> app <span
class="removed"><del><strong>because it asked the user</strong></del></span>
<span class="inserted"><ins><em>and dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
+ where they travel before and after going</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
@@ -1078,24 +1075,23 @@
<p>Tracking software in popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store</em></ins></span> by
<span
class="removed"><del><strong>companies.</a></p></strong></del></span>
<span class="inserted"><ins><em>noticing WiFi
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
- <li id="M201708270"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Sarahah</em></ins></span> app <span
class="removed"><del><strong>because it asked</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201708270">
+ <p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>words
+ book</em></ins></span> to <span class="inserted"><ins><em>developer's
server. Note that this article misuses</em></ins></span> the <span
class="removed"><del><strong>app developer but</strong></del></span> <span
class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>zero price.</p>
+ referring to zero price.</p>
</li>
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>the app developer but</strong></del></span>
<span class="inserted"><ins><em>snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
<p>Google</em></ins></span> did not
<span class="removed"><del><strong>ask about
sending</strong></del></span> <span class="inserted"><ins><em>intend to make
these apps spy; on the contrary,</em></ins></span> it
@@ -1154,7 +1150,8 @@
<ul>
- <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>developers are clever
+ <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued</strong></del></span> <span
class="inserted"><ins><em>developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -1163,20 +1160,19 @@
</li>
<li id="M201705230">
- <p>Apps for BART <a
+ <p>Apps</em></ins></span> for <span
class="removed"><del><strong>collecting</strong></del></span> <span
class="inserted"><ins><em>BART <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>makes
internet-controlled vibrators</strong></del></span> <span
class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
@@ -1253,95 +1249,42 @@
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install</em></ins></span>
- on <span class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>some of its phones.
The app will give Verizon the same information
- about the users' searches</em></ins></span> that <span
class="inserted"><ins><em>Google normally gets when they use
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>app</em></ins></span> is <span
class="removed"><del><strong>not really
-clean since</strong></del></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>, and</em></ins></span> the
<span class="removed"><del><strong>emails of members</strong></del></span>
<span class="inserted"><ins><em>user must
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>spyware is
- still spyware.</p></em></ins></span>
+ remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701210">
- <p>The Meitu photo-editing app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ <li id="M201701210">
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ <p>The Uber app tracks <a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
- consent”</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>surveillance is inadequate as a protection
against
- massive surveillance.</p></em></ins></span>
+ consent” for surveillance is inadequate as a protection against
+ massive surveillance.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160">
+ <li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>poor security
+ apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
<p>Following is a non-exhaustive list, taken from the research paper,
@@ -1568,7 +1511,8 @@
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ tracks data</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users' computers
and sends it to third parties</a>.</p>
</li>
<li id="M201804144">
@@ -1601,12 +1545,13 @@
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
+ <p>Even nastier, they do it through ad networks</em></ins></span>
that <span class="inserted"><ins><em>merge</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>data
collected by various cr…apps and sites made by different
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
+ “whales” who can be led to spend</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>lot of money.
They also
use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
@@ -1627,54 +1572,106 @@
</li>
<li id="M200510200">
- <p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
+ <p>Blizzard Warden</em></ins></span> is <span
class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>a hidden
+ “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's computer and
sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-section">
- <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Investigation
+ Shows</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>It is unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInTVSets">TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+
+<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>me and
+said, “Didn't I see you</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam</strong></del></span> <span
class="inserted"><ins><em>television?” I said, “I
don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
+before Amazon</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs.</p>
<ul class="blurbs">
<li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>article for the facts</em></ins></span> it
<span class="removed"><del><strong>“off.”</p>
+ <p>A</strong></del></span> <span class="inserted"><ins><em>presents.
It
is too bad that the article finishes by advocating the
moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
@@ -1682,77 +1679,119 @@
</li>
<li id="M201702060">
- <p>Vizio “smart” <a
+ <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>device means</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>coming from the user's own computer,
+ the TV reports what</em></ins></span> it <span
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>disable the
surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
+ does not legitimize the surveillance.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201511130">
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511130">
<p>Some web and TV advertisements play inaudible
sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
-
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>contain Javascript code,</strong></del></span>
<span class="inserted"><ins><em>correlate ads with Web
activity,</em></ins></span> and <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li id="M201511060">
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511060">
<p>Vizio goes a step further than other TV
- manufacturers in spying on their users: their <a
-
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ manufacturers</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p>
+ <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ is an injustice already.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>nonfree software</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
to the 600 millions social media profiles the company
- already monitors. Tivo customers are unaware they're
+ already monitors. Tivo customers</em></ins></span> are <span
class="inserted"><ins><em>unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ users to new combined surveillance by default.</p></em></ins></span>
</li>
- <li id="M201507240">
+ <span class="removed"><del><strong><li><p>The Nissan Leaf
has</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
</li>
<li id="M201505290">
- <p>Verizon cable TV <a
-
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
record</a>.</p>
</li>
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make its TVs snoop on what
- users watch</a>. The TVs did not do that when first sold.</p>
+ used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
+ users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> when
+ <span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>first sold.</p>
</li>
<li id="M201502090">
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or some
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
+ Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless it is done by free
- software in your own computer.</p>
+ <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>trusted
unless it is done by free</em></ins></span>
+ software in <span class="removed"><del><strong>the
car</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
@@ -1761,42 +1800,65 @@
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <p>The Amazon “Smart” TV</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
<li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ on their</em></ins></span> users</a>.</p>
+
+ <span class="removed"><del><strong><p>Even if no one
connects</strong></del></span>
- <p>The report was as of 2014, but we don't expect this has got
+ <span class="inserted"><ins><em><p>The report was as of 2014, but we
don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
+ <p>This shows that laws requiring products</em></ins></span> to
<span class="inserted"><ins><em>get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
+ the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p>
- </li>
-
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact that the transmission reports a 404 error
- really means nothing; the server could save that data anyway.)</p>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>physically remove</strong></del></span>
<span class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span>
+ <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Proprietary
software</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201405200">
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span> <span
class="inserted"><ins><em>LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available to car manufacturers, insurance
companies,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches,</em></ins></span> and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case of toll-collection systems, mentioned
in</strong></del></span> <span class="inserted"><ins><em>the switch to
turn</em></ins></span> this <span class="removed"><del><strong>article, is not
+ really</strong></del></span> <span class="inserted"><ins><em>off has
+ no effect</a>. (The fact that the transmission
reports</em></ins></span> a <span class="removed"><del><strong>matter of
proprietary surveillance. These systems are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>404 error
+ really means nothing;</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware.
The</strong></del></span> <span class="inserted"><ins><em>server could save
that data anyway.)</p>
<p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on</em></ins></span> other
+ <span class="removed"><del><strong>cases mentioned are done by
proprietary malware in the car.</p></li>
- <p>LG later said it had installed a patch to stop this, but any
- product could spy this way.</p>
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+
+ <p>LG later said it had installed a patch</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine the car's location at</strong></del></span> <span
class="inserted"><ins><em>stop this, but</em></ins></span> any <span
class="removed"><del><strong>time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store</strong></del></span>
+ <span class="inserted"><ins><em>product could spy</em></ins></span> this
<span class="removed"><del><strong>information, but if the state orders
it</strong></del></span> <span class="inserted"><ins><em>way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
@@ -1806,229 +1868,175 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>break security on a “smart”
TV</a></em></ins></span>
+ and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the
<span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>people who
are watching TV.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+</ul>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+<span class="removed"><del><strong><!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+
+
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch through them</a>.</p>
</li>
- <li id="M201511250"></em></ins></span>
+ <li id="M201511250">
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>E-books can contain Javascript code,
- and</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips
made</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
- listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
- into one.</p></em></ins></span>
+ <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>joke: The other day</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act
as</em></ins></span> a <span class="removed"><del><strong>woman came
up</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span> the <span
class="removed"><del><strong>other way.” Evidently
that</strong></del></span> <span class="inserted"><ins><em>code could surely
convert it
+ into one.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
- by most US libraries,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>the conversation between two
users</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
+ <li id="M201711100">
+ <p>A remote-control sex toy</em></ins></span> was
+<span class="removed"><del><strong>before Amazon “smart”
TVs.</p>
<ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was</em></ins></span> snooping <span
class="removed"><del><strong>devices</a>.</p>
- </li>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>found to
make</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two</em></ins></span>
users</a>.</p>
+ <span class="inserted"><ins><em></li>
- <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> its <span
class="removed"><del><strong>computers remotely and make changes in various
- settings</a>.</p>
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p></em></ins></span>
- <p>That's easy to do because the system has no authentication when
- accessed</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
+ <p>The <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> was <span
class="removed"><del><strong>as</strong></del></span> <span
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
+ products, rather than free software which users could have checked
and changed.</p>
- <p>The company that made</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
+ <p>The company</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+ consent before</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for</em></ins></span> collecting <span
class="inserted"><ins><em>lots of</em></ins></span> personal <span
class="inserted"><ins><em>information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
+ <p>The company's statement that it was anonymizing
the</em></ins></span> data <span class="removed"><del><strong>are totally
inadequate.
+ And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>may be
+ true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>TV will
+ not work.”</p>
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
- modem enables</strong></del></span>
- <span class="inserted"><ins><em>user was.</p>
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
+ user <span class="removed"><del><strong>watches — no
exceptions!</p>
+ </li>
+ <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>was.</p>
<p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
- the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
- though.</p></strong></del></span> <span class="inserted"><ins><em>its
- customers.</p></em></ins></span>
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
+ customers.</p>
</li>
- <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
+ <li id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow the company to extract data remotely and
- determine</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
-
- <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p>
- </li>
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
- <li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ <p>That the manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
+ across devices.</p>
- <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
- can <span class="removed"><del><strong>store it.</p>
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>these
+ conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>default
+ is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
- crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
+ company based in</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>a child's speech, and even speak into the
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>toys</em></ins></span> with <span
class="removed"><del><strong>online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>a mobile phone. This would enable
+ crackers to listen in on a child's speech, and even speak into the
toys themselves.</p>
</li>
<li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to
+ <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
+ <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 id="SpywareInDrones">Drones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
- to <span class="removed"><del><strong>me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in
many cases</em></ins></span> <a <span class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong>their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs are not allowed to report what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>you</a>.</p></em></ins></span>
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2037,24 +2045,8 @@
<ul class="blurbs">
<li id="M201808120">
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
- their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so that advertisers can track you
- across devices.</p>
-
- <p>It is possible to turn this off, but having it enabled by
default
- is an injustice already.</p>
- </li>
-
- <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>600 millions social media profiles the company
already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all users to
- new combined surveillance by default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
- and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would</em></ins></span> be
@@ -2087,27 +2079,24 @@
watching and listening</strong></del></span>
<span
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
listen to everyone in the house,</em></ins></span> all the
time</a>.</p>
- <span class="removed"><del><strong></li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users'</strong></del></span>
<span class="inserted"><ins><em><p>Today's technological practice
does not include any way of making
- a device that can obey your</em></ins></span> voice <span
class="inserted"><ins><em>commands without potentially spying</em></ins></span>
- on <span class="inserted"><ins><em>you. Even if it is air-gapped, it
could be saving up records
- about you for later examination.</p>
- </li>
-
- <li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>user</a>.</p>
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could be saving up records
+ about you for later examination.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
+ data about the user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>another
- company, Nuance</a>. Nuance can save it and would then
have</strong></del></span> <span class="inserted"><ins><em>spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="inserted"><ins><em>their renters</a>.</p>
</li>
</ul>
@@ -2123,8 +2112,8 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple</em></ins></span> to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>find</em></ins></span> it <span
class="inserted"><ins><em>normal that companies
+ <p>This will teach</em></ins></span> the <span
class="removed"><del><strong>internet</strong></del></span> <span
class="inserted"><ins><em>sheeple</em></ins></span> to <span
class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
monitor every aspect of what they do.</p>
</li>
</ul>
@@ -2136,22 +2125,16 @@
<li id="M201603020">
<p>A very cheap “smart watch” comes with an Android app
<a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
- that connects</em></ins></span> to <span class="removed"><del><strong>the
US or some other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ that connects to an unidentified site in China</a>.</p>
- <p>The article says this</em></ins></span> is <span
class="removed"><del><strong>not to</strong></del></span> <span
class="inserted"><ins><em>a back door, but that could</em></ins></span> be
<span class="removed"><del><strong>trusted unless</strong></del></span> <span
class="inserted"><ins><em>a
- misunderstanding. However,</em></ins></span> it is <span
class="removed"><del><strong>done
- by free software in your own computer.</p></strong></del></span>
<span class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in
- <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"></strong></del></span>
- <span class="inserted"><ins><em><li id="M201407090">
- <p>An</em></ins></span> LG “smart” <span
class="removed"><del><strong>TVs</a> reports what the user
watches,</strong></del></span> <span class="inserted"><ins><em>watch is
designed <a
+ <li id="M201407090">
+ <p>An LG “smart” watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else</em></ins></span> and
- <span class="removed"><del><strong>the switch</strong></del></span> to
<span class="removed"><del><strong>turn this off has no effect. (The fact that
the
- transmission reports a 404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>transmit
conversations
+ to report its location to someone else and to transmit conversations
too</a>.</p>
</li>
</ul>
@@ -2166,49 +2149,58 @@
<li id="M201810230">
<p>GM <a
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked</em></ins></span> the <span
class="removed"><del><strong>server</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
+ tracked the choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but it</em></ins></span> could
<span class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>have got</em></ins></span> that <span
class="removed"><del><strong>data anyway.)</p>
-
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>easily by
- sneaking</em></ins></span> it
- <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
-
- <p>LG later said it had installed a patch</strong></del></span>
<span class="inserted"><ins><em>contract that users sign for some digital
service
- or other. A requirement for consent is effectively no protection.</p>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>stop this,
but</strong></del></span> <span class="inserted"><ins><em>you,
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="inserted"><ins><em>you,
watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be
forbidden.</p>
+ phones. <em>All</em> such data collection
should</em></ins></span> be <span class="removed"><del><strong>trusted unless
it</strong></del></span> <span class="inserted"><ins><em>forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect</em></ins></span> any <span
class="removed"><del><strong>product
- could spy this way.</p>
-
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ hardware cannot collect any of that data, or that the
software</em></ins></span>
+ is <span class="removed"><del><strong>done
+ by</strong></del></span> free <span class="removed"><del><strong>software
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't
collect any of that data.</p>
</li>
- <span class="removed"><del><strong><li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711230">
+ <li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ track</em></ins></span> your <span class="removed"><del><strong>own
computer.</p></strong></del></span> <span class="inserted"><ins><em>every
move</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
- <li id="M201607160">
- <p>Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ <span class="inserted"><ins><em><li id="M201607160">
+ <p>Computerized cars with nonfree software are</em></ins></span>
<a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches, and
+ the switch to turn this off</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
<li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has a built-in
- cell phone modem which allows effectively anyone to <a
- href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ <p id="nissan-modem">The Nissan Leaf</em></ins></span> has <span
class="removed"><del><strong>no effect. (The fact that the
+ transmission reports a 404 error really means nothing; the server
+ could save that data anyway.)</p>
+
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on the user's local network.</a></p>
+
+ <p>LG later said it had installed</strong></del></span> a <span
class="removed"><del><strong>patch</strong></del></span> <span
class="inserted"><ins><em>built-in
+ cell phone modem which allows effectively anyone</em></ins></span> to
<span class="removed"><del><strong>stop this, but any product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>even what they wanted</strong></del></span> <span
class="inserted"><ins><em>make changes in various
settings</a>.</p>
@@ -2634,7 +2626,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:53 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/proprietary-surveillance.ja.po 26 Oct 2018 06:58:57 -0000 1.224
+++ po/proprietary-surveillance.ja.po 27 Oct 2018 08:28:53 -0000 1.225
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -438,11 +438,17 @@
"ä»ããããå¥ã®ä¼ç¤¾ã«ãé
ãã¾ãã"
#. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"ã¦ã£ã³ãã¦ãº10ã®ã¤ã³ã¹ãã¼ã«ãã¼ã¹ãå¢å
ãããããã«ããã¤ã¯ãã½ããã¯<a "
"href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
@@ -1360,13 +1366,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://"
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Spyware in many e-readers—not only the Kindle: <a href=\"https://www."
"eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
"user reads at what time</a>."
@@ -2936,7 +2935,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- po/proprietary-surveillance.pot 26 Oct 2018 06:58:57 -0000 1.173
+++ po/proprietary-surveillance.pot 27 Oct 2018 08:28:53 -0000 1.174
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -337,6 +337,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"In order to increase Windows 10's install base, Microsoft <a "
+"class=\"not-a-duplicate\" "
"href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
"
"blatantly disregards user choice and privacy</a>."
msgstr ""
@@ -926,13 +927,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Electronic Frontier Foundation has examined and found <a "
-"href=\"https://www.eff.org/pages/reader-privacy-chart-2012\">various kinds "
-"of surveillance in the Swindle and other e-readers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Spyware in many e-readers—not only the Kindle: <a "
"href=\"https://www.eff.org/pages/reader-privacy-chart-2012\"> they report "
"even which page the user reads at what time</a>."
@@ -2129,7 +2123,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.419
retrieving revision 1.420
diff -u -b -r1.419 -r1.420
--- po/proprietary-surveillance.ru.po 26 Oct 2018 08:58:11 -0000 1.419
+++ po/proprietary-surveillance.ru.po 27 Oct 2018 08:28:53 -0000 1.420
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-26 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -412,11 +413,21 @@
"Microsoft пеÑÐµÐ´Ð°ÐµÑ Ð¸Ñ
дÑÑгой компании."
#. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://"
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# |
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\">
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-"
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
msgstr ""
"Ð ÑелÑÑ
наÑаÑÐ¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑÑкой
Ð±Ð°Ð·Ñ Windows 10 Microsoft <a href="
"\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-"
@@ -1300,16 +1311,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://"
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-"Фонд ÑлекÑÑоннÑÑ
ÑÑбежей обÑледовал и
наÑел <a href=\"https://www.eff.org/"
-"pages/reader-privacy-chart-2012\"> Ñазного Ñода ÑÐ»ÐµÐ¶ÐºÑ Ð²
Swindle и дÑÑгиÑ
"
-"ÑÑÑÑойÑÑваÑ
ÑÑÐµÐ½Ð¸Ñ ÑлекÑÑоннÑÑ
книг</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Spyware in many e-readers—not only the Kindle: <a href=\"https://www."
"eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
"user reads at what time</a>."
@@ -3048,9 +3049,17 @@
"<em>ÐÑбой</em> ÑÐ±Ð¾Ñ ÑакиÑ
даннÑÑ
должен бÑÑÑ
запÑеÑен."
#. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
"Ðо еÑли Ð²Ñ Ñ
оÑиÑе наÑÑоÑÑей безопаÑноÑÑи,
нÑжно гаÑанÑиÑоваÑÑ, ÑÑо "
"аппаÑаÑÑÑа авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ðµ Ð¼Ð¾Ð¶ÐµÑ ÑобиÑаÑÑ
ниÑего из ÑÑиÑ
даннÑÑ
."
@@ -3590,6 +3599,15 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The Electronic Frontier Foundation has examined and found <a href="
+#~ "\"https://www.eff.org/pages/reader-privacy-chart-2012\">various kinds of "
+#~ "surveillance in the Swindle and other e-readers</a>."
+#~ msgstr ""
+#~ "Фонд ÑлекÑÑоннÑÑ
ÑÑбежей обÑледовал и
наÑел <a href=\"https://www.eff.org/"
+#~ "pages/reader-privacy-chart-2012\"> Ñазного Ñода ÑÐ»ÐµÐ¶ÐºÑ Ð²
Swindle и дÑÑгиÑ
"
+#~ "ÑÑÑÑойÑÑваÑ
ÑÑÐµÐ½Ð¸Ñ ÑлекÑÑоннÑÑ
книг</a>."
+
+#~ msgid ""
#~ "This document attempts to track <strong>clearly established cases of "
#~ "proprietary software that spies on or tracks users</strong>."
#~ msgstr ""
Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- po/proprietary.de.po 26 Oct 2018 06:58:57 -0000 1.58
+++ po/proprietary.de.po 27 Oct 2018 08:28:53 -0000 1.59
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -445,7 +445,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -504,14 +505,6 @@
"right on the thermostat."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- po/proprietary.es.po 26 Oct 2018 06:58:57 -0000 1.57
+++ po/proprietary.es.po 27 Oct 2018 08:28:53 -0000 1.58
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-09-19 10:49+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -458,7 +458,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -517,14 +518,6 @@
"right on the thermostat."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary.fr.po 26 Oct 2018 11:45:30 -0000 1.67
+++ po/proprietary.fr.po 27 Oct 2018 08:28:53 -0000 1.68
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-26 13:44+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -321,9 +322,17 @@
"de ce type doit être interdit."
#. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
"Mais si vous voulez être vraiment en sécurité, vous devez vous assurer que
"
"le matériel de la voiture ne peut collecter aucune de ces données."
@@ -417,18 +426,6 @@
"libre. Avec un thermostat traditionnel, on peut le faire directement sur le "
"thermostat."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-"Des chercheurs ont découvert un moyen de <a href=\"http://news.rub.de/"
-"english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"
-"\">cacher des commandes vocales dans d'autres flux audio</a>. Elles sont "
-"inaudibles pour les humains, mais Alexa et Siri peuvent les entendre."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +503,17 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
+#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
+#~ "but Alexa and Siri can."
+#~ msgstr ""
+#~ "Des chercheurs ont découvert un moyen de <a href=\"http://news.rub.de/"
+#~ "english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"
+#~ "\">cacher des commandes vocales dans d'autres flux audio</a>. Elles sont "
+#~ "inaudibles pour les humains, mais Alexa et Siri peuvent les entendre."
+
+#~ msgid ""
#~ "Android has a <a href=\"https://www.theverge.com/platform/"
#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
#~ "change\"> back door for remotely changing “user” settings</a>."
Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary.it-diff.html 26 Oct 2018 06:58:57 -0000 1.16
+++ po/proprietary.it-diff.html 27 Oct 2018 08:28:54 -0000 1.17
@@ -43,14 +43,14 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
40em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 40em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -154,10 +154,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -194,7 +194,8 @@
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data.</p>
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that data.</p>
</li>
<li id="M201810150">
@@ -243,13 +244,6 @@
nonfree software. With an old-fashioned thermostat, you can do it
using controls right on the thermostat.</p>
</li>
-
- <li id="M201809240">
- <p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +304,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:54 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary.it.po 26 Oct 2018 06:58:57 -0000 1.67
+++ po/proprietary.it.po 27 Oct 2018 08:28:54 -0000 1.68
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -449,7 +449,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -508,14 +509,6 @@
"right on the thermostat."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary.ja-diff.html 26 Oct 2018 06:58:57 -0000 1.18
+++ po/proprietary.ja-diff.html 27 Oct 2018 08:28:54 -0000 1.19
@@ -152,10 +152,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -191,7 +191,8 @@
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data.</p>
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that data.</p>
</li>
<li id="M201810150">
@@ -240,13 +241,6 @@
nonfree software. With an old-fashioned thermostat, you can do it
using controls right on the thermostat.</p>
</li>
-
- <li id="M201809240">
- <p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:54 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- po/proprietary.ja.po 26 Oct 2018 06:58:57 -0000 1.50
+++ po/proprietary.ja.po 27 Oct 2018 08:28:54 -0000 1.51
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -371,7 +371,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -430,14 +431,6 @@
"right on the thermostat."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary.nl-diff.html 26 Oct 2018 06:58:57 -0000 1.16
+++ po/proprietary.nl-diff.html 27 Oct 2018 08:28:54 -0000 1.17
@@ -43,14 +43,14 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
40em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 40em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -194,7 +194,8 @@
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data.</p>
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that data.</p>
</li>
<li id="M201810150">
@@ -243,13 +244,6 @@
nonfree software. With an old-fashioned thermostat, you can do it
using controls right on the thermostat.</p>
</li>
-
- <li id="M201809240">
- <p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +304,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:54 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- po/proprietary.nl.po 26 Oct 2018 06:58:57 -0000 1.40
+++ po/proprietary.nl.po 27 Oct 2018 08:28:54 -0000 1.41
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -442,7 +442,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -501,14 +502,6 @@
"right on the thermostat."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/proprietary.pl-diff.html 26 Oct 2018 06:58:57 -0000 1.34
+++ po/proprietary.pl-diff.html 27 Oct 2018 08:28:54 -0000 1.35
@@ -25,9 +25,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,8 +40,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -85,8 +85,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of October 26, 2018, the pages in this directory list 340
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with 404 references
to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October 26, 2018, the pages in this directory
list 340
+instances of malicious functionalities (with 404 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -121,18 +121,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -192,7 +192,8 @@
phones. <em>All</em> such data collection should be
forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data.</p>
+ hardware cannot collect any of that data, or that the software
+ is free so we know it won't collect any of that data.</p>
</li>
<li id="M201810150">
@@ -241,13 +242,6 @@
nonfree software. With an old-fashioned thermostat, you can do it
using controls right on the thermostat.</p>
</li>
-
- <li id="M201809240">
- <p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p>
- </li>
</ul></em></ins></span>
@@ -308,7 +302,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:54 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/proprietary.pl.po 26 Oct 2018 06:58:57 -0000 1.35
+++ po/proprietary.pl.po 27 Oct 2018 08:28:54 -0000 1.36
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -523,7 +523,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -582,14 +583,6 @@
"right on the thermostat."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- po/proprietary.pot 26 Oct 2018 06:58:57 -0000 1.32
+++ po/proprietary.pot 27 Oct 2018 08:28:54 -0000 1.33
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -263,7 +263,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -323,14 +324,6 @@
"right on the thermostat."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a "
-"href=\"http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\">
"
-"hide voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary.pt-br.po 26 Oct 2018 06:58:57 -0000 1.17
+++ po/proprietary.pt-br.po 27 Oct 2018 08:28:54 -0000 1.18
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-22 13:22-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -316,7 +316,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -409,18 +410,6 @@
"livre. Com um termostato antiquado, você pode fazê-lo usando controles "
"diretamente no termostato."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-"Pesquisadores descobriram como <a href=\"http://news.rub.de/english/press-"
-"releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> ocultar "
-"comandos de voz em outro áudio</a>, para que as pessoas não possam
ouvi-las, "
-"mas Alexa e Siri podem."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -499,6 +488,17 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
+#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
+#~ "but Alexa and Siri can."
+#~ msgstr ""
+#~ "Pesquisadores descobriram como <a href=\"http://news.rub.de/english/press-"
+#~ "releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> ocultar "
+#~ "comandos de voz em outro áudio</a>, para que as pessoas não possam ouvi-"
+#~ "las, mas Alexa e Siri podem."
+
+#~ msgid ""
#~ "Android has a <a href=\"https://www.theverge.com/platform/"
#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
#~ "change\"> back door for remotely changing “user” settings</a>."
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- po/proprietary.ru.po 26 Oct 2018 08:58:11 -0000 1.88
+++ po/proprietary.ru.po 27 Oct 2018 08:28:54 -0000 1.89
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-10-26 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -324,9 +325,17 @@
"<em>ÐÑбой</em> ÑÐ±Ð¾Ñ ÑакиÑ
даннÑÑ
должен бÑÑÑ
запÑеÑен."
#. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
"Ðо еÑли Ð²Ñ Ñ
оÑиÑе наÑÑоÑÑей безопаÑноÑÑи,
нÑжно гаÑанÑиÑоваÑÑ, ÑÑо "
"аппаÑаÑÑÑа авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ðµ Ð¼Ð¾Ð¶ÐµÑ ÑобиÑаÑÑ
ниÑего из ÑÑиÑ
даннÑÑ
."
@@ -422,18 +431,6 @@
"ÑÑаÑомоднÑÑ
ÑеÑмоÑÑаÑаÑ
ÑÑо делаеÑÑÑ Ñ
помоÑÑÑ Ð¾Ñганов ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑÑмо на "
"ÑеÑмоÑÑаÑе."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-"ÐÑÑледоваÑели оÑкÑÑли ÑпоÑоб <a
href=\"http://news.rub.de/english/press-"
-"releases/2018-09-24-it-security-secret-messages-alexa-and-co\">
ÑкÑÑваÑÑ "
-"голоÑовÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² дÑÑгиÑ
звÑкозапиÑÑÑ
</a>, Ñак ÑÑо лÑди ÑÑи ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð½Ðµ "
-"ÑлÑÑаÑ, но иÑ
ÑлÑÑÐ°Ñ Alexa и Siri."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -513,6 +510,17 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/"
+#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
+#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
+#~ "but Alexa and Siri can."
+#~ msgstr ""
+#~ "ÐÑÑледоваÑели оÑкÑÑли ÑпоÑоб <a
href=\"http://news.rub.de/english/press-"
+#~ "releases/2018-09-24-it-security-secret-messages-alexa-and-co\">
ÑкÑÑваÑÑ "
+#~ "голоÑовÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² дÑÑгиÑ
звÑкозапиÑÑÑ
</a>, Ñак ÑÑо лÑди ÑÑи ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð½Ðµ "
+#~ "ÑлÑÑаÑ, но иÑ
ÑлÑÑÐ°Ñ Alexa и Siri."
+
+#~ msgid ""
#~ "Android has a <a href=\"https://www.theverge.com/platform/"
#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
#~ "change\"> back door for remotely changing “user” settings</a>."
Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary.zh-tw.po 26 Oct 2018 06:58:57 -0000 1.18
+++ po/proprietary.zh-tw.po 27 Oct 2018 08:28:54 -0000 1.19
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -360,7 +360,8 @@
#. type: Content of: <ul><li><p>
msgid ""
"But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -419,14 +420,6 @@
"right on the thermostat."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-apple.fr.html malware-a...,
GNUN <=