[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-appliances.de-diff.h...
From: |
GNUN |
Subject: |
www/proprietary/po malware-appliances.de-diff.h... |
Date: |
Sun, 4 Nov 2018 16:58:31 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/11/04 16:58:30
Modified files:
proprietary/po : malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de.po proprietary.es.po
proprietary.fr.po proprietary.it-diff.html
proprietary.it.po proprietary.ja-diff.html
proprietary.ja.po proprietary.nl-diff.html
proprietary.nl.po proprietary.pl-diff.html
proprietary.pl.po proprietary.pot
proprietary.pt-br.po proprietary.ru.po
proprietary.zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.425&r2=1.426
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.21&r2=1.22
Patches:
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-appliances.de-diff.html 25 Oct 2018 10:31:08 -0000 1.14
+++ malware-appliances.de-diff.html 4 Nov 2018 21:58:29 -0000 1.15
@@ -64,425 +64,470 @@
here, please write</em></ins></span>
to <span class="removed"><del><strong>make</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
of</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span>
two <span
class="removed"><del><strong>users</a>.</p></strong></del></span>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span>
two <span class="removed"><del><strong>users</a>.</p>
+ </li>
+
+ <li>
+ <p>Every</strong></del></span>
<span class="inserted"><ins><em>to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
- <li id="M201810150">
- <p>Printer manufacturers are very innovative—at blocking the
- use of independent replacement ink cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge DRM. <a
-
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>Every “home security” camera, if its manufacturer
can</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201809260">
- <p>Honeywell's “smart” thermostats</em></ins></span>
communicate <span class="removed"><del><strong>with it,
- is a surveillance device.</strong></del></span>
- <span class="inserted"><ins><em>only through the company's server. They
have
- all the nasty characteristics of such devices:</em></ins></span> <a
+ <li id="M201810300">
+ <p>Nearly all</em></ins></span> “home <span
class="removed"><del><strong>security” camera, if its manufacturer can
communicate with it,
+ is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>security cameras”</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all users at once), as well as the risk of</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>outage (which is what
- just happened).</p>
-
- <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right</em></ins></span> on the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>thermostat.</p>
- </li>
-
- <li id="M201809240">
- <p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so</em></ins></span> that
<span class="removed"><del><strong>the device is</strong></del></span> <span
class="inserted"><ins><em>people cannot hear
- them, but Alexa and Siri can.</p>
- </li>
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by the manufacturer, based on
the fact
+ that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>device is
tethered to</strong></del></span> <span class="inserted"><ins><em>manufacturer
an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But</strong></del></span> <span class="inserted"><ins><em>better
+ name!</p>
- <li id="M201807050">
- <p>The Jawbone fitness tracker was</em></ins></span> tethered to a
<span class="removed"><del><strong>server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More
about</strong></del></span> proprietary <span
class="removed"><del><strong>tethering</a>.</p>
- <p>But it also demonstrates that the device
gives</strong></del></span> <span class="inserted"><ins><em>phone
- app. In 2017,</em></ins></span> the company
- <span class="removed"><del><strong>surveillance capability.</p>
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>suggested</em></ins></span> that <span
class="removed"><del><strong>the device gives the company
+ surveillance capability.</p>
</li>
<li>
<p>A “smart” intravenous pump designed for
- hospitals is connected to</strong></del></span> <span
class="inserted"><ins><em>shut down and made</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally</strong></del></span> <span
class="inserted"><ins><em>app stop working.</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security has been cracked</a>.</p>
- <p>Note that this article misuses</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All</em></ins></span>
- the <span class="removed"><del><strong>term <a
+ hospitals is connected</strong></del></span> <span
class="inserted"><ins><em>these
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally <a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its</strong></del></span> <span class="inserted"><ins><em>videos. That's
not</em></ins></span>
+ security <span class="removed"><del><strong>has been
cracked</a>.</p>
+ <p>Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p>
-</li>
+ referring</strong></del></span> <span class="inserted"><ins><em>for your
home. Security means making sure they don't get</em></ins></span> to <span
class="removed"><del><strong>crackers.</p></strong></del></span>
+ <span class="inserted"><ins><em>see through your
camera.</p></em></ins></span>
+ </li>
-<li></strong></del></span> <span class="inserted"><ins><em>existing
trackers stopped working forever</a>.</p></em></ins></span>
+<span class="removed"><del><strong><li>
+ <p>The bad security in many Internet</strong></del></span>
- <p>The <span class="removed"><del><strong>bad security in many
Internet of Stings devices
- allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop</strong></del></span> <span class="inserted"><ins><em>article
focuses</em></ins></span> on <span class="removed"><del><strong>the people that
use them</a>.</p>
- <p>Don't be</strong></del></span> a <span
class="removed"><del><strong>sucker—reject all</strong></del></span>
<span class="inserted"><ins><em>further nasty fillip, that sales
of</em></ins></span> the <span class="removed"><del><strong>stings.</p>
- <p>It is unfortunate</strong></del></span>
- <span class="inserted"><ins><em>broken devices continued. But I
think</em></ins></span> that <span class="inserted"><ins><em>is a secondary
issue;
- it made</em></ins></span> the <span class="removed"><del><strong>article
uses</strong></del></span> <span class="inserted"><ins><em>nasty consequences
extend to some additional people.
- The fundamental wrong was to design</em></ins></span> the
- <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
-</li>
+ <span class="inserted"><ins><em><li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use</em></ins></span> of <span class="removed"><del><strong>Stings devices
+ allows</strong></del></span> <span class="inserted"><ins><em>independent
replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
+ <li id="M201809260">
+ <p>Honeywell's “smart” thermostats communicate
+ only through</em></ins></span> the <span
class="removed"><del><strong>people that use them</a>.</p>
+ <p>Don't be</strong></del></span> <span
class="inserted"><ins><em>company's server. They have
+ all the nasty characteristics of such devices: <a
+
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance, and danger of sabotage</a> (of</em></ins></span> a
<span class="removed"><del><strong>sucker—reject</strong></del></span>
<span class="inserted"><ins><em>specific user, or of</em></ins></span>
+ all <span class="inserted"><ins><em>users at once), as well
as</em></ins></span> the <span class="removed"><del><strong>stings.</p>
+ <p>It</strong></del></span> <span class="inserted"><ins><em>risk of an
outage (which</em></ins></span> is <span
class="removed"><del><strong>unfortunate that</strong></del></span> <span
class="inserted"><ins><em>what
+ just happened).</p>
-<li>
+ <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>article uses</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can do it
+ using controls right on</em></ins></span> the
+ <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></strong></del></span>
<span class="inserted"><ins><em>thermostat.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>Many models of Internet-connected cameras are tremendously insecure.
- They have login accounts with hard-coded passwords, which can't be
- changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span> <span
class="inserted"><ins><em>devices</em></ins></span> to
+ They</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201809240">
+ <p>Researchers</em></ins></span> have <span
class="removed"><del><strong>login accounts with hard-coded passwords, which
can't be
+ changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span> <span class="inserted"><ins><em>discovered
how</em></ins></span> to
<span class="removed"><del><strong>delete these accounts
either</a>.</p>
</li>
<li>
-<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>depend on something
- else</em></ins></span> that <span class="removed"><del><strong>runs
pacemakers, insulin pumps, and other</strong></del></span> <span
class="inserted"><ins><em>didn't respect users' freedom.</p>
+<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so</em></ins></span> that
<span class="removed"><del><strong>runs pacemakers, insulin
pumps,</strong></del></span> <span class="inserted"><ins><em>people cannot hear
+ them, but Alexa</em></ins></span> and <span
class="removed"><del><strong>other
+medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Siri can.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li><p>Users are suing Bose for
<a
+href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201807050">
+ <p>The Jawbone fitness tracker was tethered to</em></ins></span> a
<span class="removed"><del><strong>spyware app for its headphones</a>.
+Specifically, the app would record</strong></del></span> <span
class="inserted"><ins><em>proprietary phone
+ app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>company shut down and made</em></ins></span> the
<span class="removed"><del><strong>audio files
+users listen to along with</strong></del></span> <span
class="inserted"><ins><em>app stop working. <a
+
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All</em></ins></span>
+ the <span class="removed"><del><strong>headphone's unique serial number.
+</p></strong></del></span> <span class="inserted"><ins><em>existing
trackers stopped working forever</a>.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>suit
accuses</strong></del></span> <span class="inserted"><ins><em>article focuses
on a further nasty fillip,</em></ins></span> that <span
class="removed"><del><strong>this was done without the users' consent.
+If the fine print</strong></del></span> <span
class="inserted"><ins><em>sales</em></ins></span> of the <span
class="removed"><del><strong>app said that users gave consent for this,
+would</strong></del></span>
+ <span class="inserted"><ins><em>broken devices continued. But I
think</em></ins></span> that <span
class="removed"><del><strong>make</strong></del></span> <span
class="inserted"><ins><em>is a secondary issue;</em></ins></span>
+ it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>made the nasty
consequences extend to some additional people.
+ The fundamental wrong was</em></ins></span> to design the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>devices</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>depend on
something
+ else that didn't respect users' freedom.</p></em></ins></span>
</li>
- <li id="M201804140">
- <p>A</em></ins></span> medical <span
class="removed"><del><strong>devices is</strong></del></span> <span
class="inserted"><ins><em>insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
+ <li <span class="removed"><del><strong>id="anova">
+ <p>Anova sabotaged users' cooking devices with</strong></del></span>
<span class="inserted"><ins><em>id="M201804140">
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers</em></ins></span> a <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush</em></ins></span> that
+ <span class="removed"><del><strong>tethered them to a remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account</strong></del></span> <span
class="inserted"><ins><em>snoops</em></ins></span> on <span
class="removed"><del><strong>Anova's servers, their
+ cookers won't function.</a></p></strong></del></span> <span
class="inserted"><ins><em>its user by
sending usage data back over the
Internet</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li><p>Users are suing Bose
for</strong></del></span>
+<span class="removed"><del><strong><li>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher
is</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to the Internet,
+its security is crap</a>.</p>
+<p>For example,</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
+ load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>cracker can gain access</strong></del></span>
<span class="inserted"><ins><em>surveillance app</a>.</p>
- <p>We link to the article</em></ins></span> for <span
class="removed"><del><strong>its headphones</a>.
-Specifically,</strong></del></span> the <span class="removed"><del><strong>app
would record</strong></del></span> <span class="inserted"><ins><em>facts it
presents. It
- is too bad that</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the
<span class="removed"><del><strong>audio files</strong></del></span>
- <span class="inserted"><ins><em>moral weakness of surrendering to Netflix.
The Netflix app <a
+ <p>We link</em></ins></span> to the <span
class="removed"><del><strong>dishwasher's filesystem,
+ infect</strong></del></span> <span class="inserted"><ins><em>article for the
facts</em></ins></span> it <span class="removed"><del><strong>with malware, and
force</strong></del></span> <span class="inserted"><ins><em>presents. It
+ is too bad that</em></ins></span> the <span
class="removed"><del><strong>dishwasher</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating the
+ moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
+ other</strong></del></span> <span class="inserted"><ins><em>Netflix. The
Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201802120">
- <p>Apple devices lock</em></ins></span> users <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>in <a
-
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely</em></ins></span> to <span
class="removed"><del><strong>along</strong></del></span> <span
class="inserted"><ins><em>Apple services</a> by being designed to be
incompatible</em></ins></span>
- with <span class="inserted"><ins><em>all other options, ethical or
unethical.</p>
- </li>
+ <p>Apple</em></ins></span> devices <span
class="inserted"><ins><em>lock users</em></ins></span> in <span
class="removed"><del><strong>the network. Since these dishwashers are used in
hospitals,
+ such attacks could potentially put hundreds of lives at risk.</p>
- <li id="M201712240">
- <p>One of</em></ins></span> the <span
class="removed"><del><strong>headphone's unique serial number.
-</p>
-
-<p>The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>dangers
of</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span class="inserted"><ins><em>“internet of
stings”
+</li>
+<li>
+<p>If you buy a used “smart” car, house, TV, refrigerator,
+etc.,
+usually</strong></del></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+previous owners can still remotely control
it</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being designed to be incompatible
+ with all other options, ethical or unethical.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming
from</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201712240">
+ <p>One of</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>dangers
of</em></ins></span> the <span class="removed"><del><strong>TV reports what it
is. The existence</strong></del></span> <span
class="inserted"><ins><em>“internet</em></ins></span> of <span
class="inserted"><ins><em>stings”
is that, if you lose your internet service, you also <a
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control</em></ins></span> of <span class="inserted"><ins><em>your
house and appliances</a>.</p>
+ lose control of your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance with a connection
to</em></ins></span> the <span class="removed"><del><strong>app said that users
gave consent for this,
-would that make it acceptable? No way! It should</strong></del></span>
+ <p>For your safety, don't use any appliance with</em></ins></span> a
<span class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>connection</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as
it</strong></del></span>
<span class="inserted"><ins><em>real internet.</p>
</li>
<li id="M201711200">
- <p>Amazon recently invited consumers to</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>suckers and</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>open their front doors</a>. Wouldn't you know
- it,</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>system has a grave security flaw.</p>
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system has a grave security flaw.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>make <a
+ <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two
users</a>.</p></em></ins></span>
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+<p>More or less</strong></del></span>
- <li <span class="removed"><del><strong>id="anova">
- <p>Anova sabotaged users' cooking</strong></del></span> <span
class="inserted"><ins><em>id="M201711080">
- <p>Logitech will sabotage
- all Harmony Link household control</em></ins></span> devices <span
class="inserted"><ins><em>by <a
-
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ <span class="inserted"><ins><em><li id="M201711080">
+ <p>Logitech will sabotage</em></ins></span>
+ all <span class="removed"><del><strong>“smart”
TVs</strong></del></span> <span class="inserted"><ins><em>Harmony Link
household control devices by</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
turning off the server through which the products' supposed owners
- communicate</em></ins></span> with <span class="removed"><del><strong>a
downgrade that
- tethered</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
+ communicate with them</a>.</p></em></ins></span>
- <p>The owners suspect this is to pressure</em></ins></span> them to
<span class="inserted"><ins><em>buy</em></ins></span> a <span
class="removed"><del><strong>remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless</strong></del></span>
<span class="inserted"><ins><em>newer model. If
- they are wise, they will learn, rather, to distrust any product that
- requires</em></ins></span> users <span class="removed"><del><strong>create
an account on Anova's servers, their
- cookers won't function.</a></p></strong></del></span> <span
class="inserted"><ins><em>to talk with them through some specialized
service.</p></em></ins></span>
- </li>
+ <p>The <span class="removed"><del><strong>report was as of 2014, but
we don't expect</strong></del></span> <span class="inserted"><ins><em>owners
suspect</em></ins></span> this <span class="removed"><del><strong>has got
+better.</p>
+
+<p>This shows that laws requiring products</strong></del></span> <span
class="inserted"><ins><em>is</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+consent before collecting personal data are totally inadequate. And
+what happens if</strong></del></span> <span class="inserted"><ins><em>pressure
them to buy</em></ins></span> a <span class="removed"><del><strong>user
declines consent? Probably the TV</strong></del></span> <span
class="inserted"><ins><em>newer model. If
+ they are wise, they</em></ins></span> will <span
class="removed"><del><strong>say,
+“Without your consent</strong></del></span> <span
class="inserted"><ins><em>learn, rather,</em></ins></span> to <span
class="removed"><del><strong>tracking, the TV will not
+work.”</p>
+<p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>distrust any product</em></ins></span> that <span
class="removed"><del><strong>TVs are not allowed</strong></del></span>
+ <span class="inserted"><ins><em>requires users</em></ins></span> to <span
class="removed"><del><strong>report what the
+user watches — no exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>talk with them through some specialized
service.</p></em></ins></span>
+ </li>
<span class="removed"><del><strong><li>
-<p>When Miele's Internet of Stings hospital disinfectant
dishwasher</strong></del></span>
+<p>Some LG
+TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+tyrants</a>.</p>
+</li>
+
+<li><a
+href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
+Samsung “Smart” TVs have turned Linux into the base
+for a tyrant system</a> so as to impose DRM.
+What enables Samsung to do this is that Linux is released under
+GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version
3</a>,
+together</strong></del></span>
<span class="inserted"><ins><em><li id="M201710040">
<p>Every “home security” camera, if its
- manufacturer can communicate with it,</em></ins></span> is <span
class="inserted"><ins><em>a surveillance device.</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span>
+ manufacturer can communicate</em></ins></span> with <span
class="inserted"><ins><em>it, is</em></ins></span> a <span
class="removed"><del><strong>weak interpretation of GPL version 2.
+</li>
+
+<li>
+<p>A company that makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>surveillance
device.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+being sued for collecting lots of personal information about how
+people use it</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
+ Canary camera is an example</a>.</p></em></ins></span>
- <p>The article describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>Internet,
-its security</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on
- the fact that the device</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
-<p>For example, a cracker can gain access</strong></del></span> <span
class="inserted"><ins><em>tethered</em></ins></span> to <span
class="removed"><del><strong>the dishwasher's filesystem,
- infect</strong></del></span> <span class="inserted"><ins><em>a
server.</p>
+ <p>The <span class="removed"><del><strong>company's statement that
it anonymizes</strong></del></span> <span class="inserted"><ins><em>article
describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>data may be true,
+but it doesn't really matter. If it sells</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+ the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>fact that the device is tethered</em></ins></span> to
a <span class="removed"><del><strong>data broker,</strong></del></span> <span
class="inserted"><ins><em>server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</em></ins></span> it <span class="removed"><del><strong>with
malware, and force</strong></del></span> <span class="inserted"><ins><em>also
demonstrates that</em></ins></span> the <span
class="removed"><del><strong>dishwasher to launch attacks on
- other devices in</strong></del></span> <span class="inserted"><ins><em>device
gives</em></ins></span> the <span class="removed"><del><strong>network. Since
these dishwashers are used in hospitals,
- such attacks could potentially put hundreds of lives at
risk.</p></strong></del></span> <span class="inserted"><ins><em>company
+ <p>But it also demonstrates that</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>device
gives</em></ins></span> the <span class="removed"><del><strong>user
is.</p></strong></del></span> <span class="inserted"><ins><em>company
surveillance capability.</p></em></ins></span>
</li>
+
<span class="removed"><del><strong><li>
-<p>If you buy a used</strong></del></span>
+<p>Google/Alphabet</strong></del></span>
<span class="inserted"><ins><em><li id="M201709200">
- <p>A</em></ins></span> “smart” <span
class="removed"><del><strong>car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span> <span class="inserted"><ins><em>intravenous pump
- designed for hospitals is connected to the internet.
Naturally</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely control
it</a>.</p></strong></del></span>
+ <p>A “smart” intravenous pump
+ designed for hospitals is connected to the internet.
Naturally</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+intentionally broke Revolv home automatic control
products</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note that this article misuses the term <a
+ <p>Note</em></ins></span> that <span
class="removed"><del><strong>depended on
+a server</a></strong></del></span> <span class="inserted"><ins><em>this
article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p></em></ins></span>
+ referring</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't stand for that!
Insist
+on self-contained computers that run free
software!</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
</li>
+
<span class="removed"><del><strong><li>
- <p>Vizio
- “smart”</strong></del></span>
+<p>ARRIS cable modem has a <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+backdoor</strong></del></span>
<span class="inserted"><ins><em><li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop</em></ins></span> on <span class="removed"><del><strong>them, and
not just broadcasts
- and cable</a>. Even if</strong></del></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>people that use them</a>.</p>
-
- <p>Don't be a sucker—reject all the stings.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>coming
from</strong></del></span> <span class="inserted"><ins><em>unfortunate
that</em></ins></span> the <span class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>article
uses</em></ins></span> the <span class="removed"><del><strong>TV reports what
it is. The existence of a way</strong></del></span> <span
class="inserted"><ins><em>term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>The bad security</em></ins></span> in <span
class="inserted"><ins><em>many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
+</li>
+
+<li>
+<p>HP “storage appliances”</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> that use <span
class="inserted"><ins><em>them</a>.</p>
+
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>proprietary
+“Left Hand” operating system have back doors</strong></del></span>
<span class="inserted"><ins><em>stings.</p>
+
+ <p>It is unfortunate</em></ins></span> that <span
class="removed"><del><strong>give HP</strong></del></span> <span
class="inserted"><ins><em>the article uses the term</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a> to them. HP claims that this does not give HP
+access</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li id="M201708230">
<p>Sonos <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”</em></ins></span>
- to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>snooping or</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
- these TVs, does not legitimize the surveillance.</p>
-</li>
-<li>
-<p>More or less all “smart” TVs</strong></del></span> <span
class="inserted"><ins><em>product will stop
working</a>.</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
-<p>The report was as of 2014,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another
- article</a> says they won't forcibly change the
software,</em></ins></span> but <span class="removed"><del><strong>we don't
expect this has got
-better.</p>
-
-<p>This shows that laws requiring products</strong></del></span>
- <span class="inserted"><ins><em>people won't be able</em></ins></span> to
get <span class="removed"><del><strong>users' formal
-consent before collecting personal data are totally inadequate. And
-what happens if a user declines consent? Probably the TV will say,
-“Without your consent to tracking, the TV</strong></del></span> <span
class="inserted"><ins><em>any upgrades and eventually it</em></ins></span> will
<span class="removed"><del><strong>not
-work.”</p>
-
-<p>Proper laws would say that TVs are not allowed to report what the
-user watches — no exceptions!</p></strong></del></span>
- <span class="inserted"><ins><em>stop working.</p></em></ins></span>
+ to <span class="inserted"><ins><em>snooping or</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if the back door allows
+installation of software changes, a</strong></del></span> <span
class="inserted"><ins><em>product will stop working</a>. <a
+
href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another
+ article</a> says they won't forcibly</em></ins></span> change <span
class="removed"><del><strong>could</strong></del></span> <span
class="inserted"><ins><em>the software, but
+ people won't</em></ins></span> be <span
class="removed"><del><strong>installed that
+would give access</strong></del></span> <span
class="inserted"><ins><em>able</em></ins></span> to <span
class="removed"><del><strong>the customer's data.
+</p></strong></del></span> <span class="inserted"><ins><em>get any
upgrades and eventually it will
+ stop working.</p></em></ins></span>
</li>
+
<span class="removed"><del><strong><li>
-<p>Some LG
-TVs</strong></del></span>
+<p><a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+Some D-Link routers</a> have</strong></del></span>
<span class="inserted"><ins><em><li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases</em></ins></span> <a
<span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
-tyrants</a>.</p></strong></del></span>
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>back door for changing
settings</strong></del></span> <span class="inserted"><ins><em>DJI drone
+ to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>a
+dlink of an eye.</p>
+
+<p></strong></del></span> <span class="inserted"><ins><em>many
cases</em></ins></span> <a <span
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764">Many</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ on you</a>.</p>
</li>
-<span class="removed"><del><strong><li><a
-href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-Samsung “Smart” TVs</strong></del></span>
+ <li id="M201706200">
+ <p>Many</em></ins></span> models of <span
class="removed"><del><strong>routers</strong></del></span> <span
class="inserted"><ins><em>Internet-connected cameras
+ are tremendously insecure. They</em></ins></span> have <span
class="removed"><del><strong>back doors</a>.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201706200">
- <p>Many models of Internet-connected cameras
- are tremendously insecure. They</em></ins></span> have <span
class="removed"><del><strong>turned Linux into the base
-for a tyrant system</a> so as to impose DRM.
-What enables Samsung to do this</strong></del></span> <span
class="inserted"><ins><em>login
+<li>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router has a backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>login
accounts with hard-coded passwords, which can't be changed, and <a
-
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</em></ins></span>
- is <span class="inserted"><ins><em>no way to delete these accounts
either</a>.</p>
+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts
either</a>.</p></em></ins></span>
</li>
- <li id="M201705250">
- <p>The proprietary code</em></ins></span> that <span
class="removed"><del><strong>Linux</strong></del></span> <span
class="inserted"><ins><em>runs pacemakers,
- insulin pumps, and other medical devices</em></ins></span> is <span
class="removed"><del><strong>released under
-GNU GPL version 2,</strong></del></span> <a <span
class="removed"><del><strong>href="/licenses/rms-why-gplv3.html">not version
3</a>,
-together with a weak interpretation</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full</em></ins></span> of <span class="removed"><del><strong>GPL version
2.</strong></del></span> <span class="inserted"><ins><em>gross
- security faults</a>.</p></em></ins></span>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705250"></em></ins></span>
+ <p>The <span class="removed"><del><strong><a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer was designed with DRM</a>: it won't accept
+third-party printing materials. It</strong></del></span> <span
class="inserted"><ins><em>proprietary code that runs pacemakers,
+ insulin pumps, and other medical devices</em></ins></span> is <span
class="removed"><del><strong>the Keurig</strong></del></span> <span
class="inserted"><ins><em><a
+ href="http://www.bbc.co.uk/news/technology-40042584">
full</em></ins></span> of <span class="removed"><del><strong>printers. Now it
is
+being discontinued, which means</strong></del></span> <span
class="inserted"><ins><em>gross
+ security faults</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>A company that makes internet-controlled vibrators
-<a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
-being sued</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705180">
- <p>Bird and rabbit pets were implemented</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
-people use it</a>.</p>
-
-<p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>Second
- Life by a company</em></ins></span> that <span
class="removed"><del><strong>it anonymizes the data may be true,
-but it doesn't really matter. If it sells the data</strong></del></span> <span
class="inserted"><ins><em>tethered their food</em></ins></span> to a <span
class="removed"><del><strong>data broker,</strong></del></span> <span
class="inserted"><ins><em>server. <a
+ <li id="M201705180">
+ <p>Bird and rabbit pets were implemented for Second
+ Life by a company</em></ins></span> that <span
class="removed"><del><strong>eventually authorized materials won't
+be available</strong></del></span> <span class="inserted"><ins><em>tethered
their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down</em></ins></span> the <span class="removed"><del><strong>data
broker can figure out who</strong></del></span> <span
class="inserted"><ins><em>server and</em></ins></span> the <span
class="removed"><del><strong>user is.</p></strong></del></span> <span
class="inserted"><ins><em>pets more or less
died</a>.</p></em></ins></span>
- </li>
+ It shut down the server</em></ins></span> and the <span
class="removed"><del><strong>printers may become unusable.</p>
-<span class="removed"><del><strong><li>
-<p>Google/Alphabet</strong></del></span>
+<p>With a</strong></del></span> <span class="inserted"><ins><em>pets
more or less died</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
-intentionally broke Revolv home automatic control products that depended
on</strong></del></span>
+ <li id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span
class="removed"><del><strong>server</a> to function. The lesson is,
don't stand</strong></del></span> <span class="inserted"><ins><em>spyware
app</em></ins></span> for <span class="removed"><del><strong>that! Insist
-on self-contained computers that run free software!</p>
-</li>
-
-<li>
-<p>ARRIS cable modem has a <a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor in</strong></del></span> <span class="inserted"><ins><em>its
headphones</a>. Specifically,</em></ins></span>
- the <span class="removed"><del><strong>backdoor</a>.</p>
+ distributing a spyware app for its headphones</a>.
Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>Respects Your Freedom</a>,
this problem</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> would <span
class="removed"><del><strong>not
+even be a remote possibility.</p>
+
+<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>record</em></ins></span> the <span
class="removed"><del><strong>author</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of <span
class="removed"><del><strong>that article says that there was
+“nothing wrong” with designing</strong></del></span> the <span
class="removed"><del><strong>device to restrict</strong></del></span> <span
class="inserted"><ins><em>audio files</em></ins></span> users <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>listen to
+ along with</em></ins></span> the <span class="removed"><del><strong>first
place. This is like putting a “cheat me and mistreat me”
+sign on your chest. We should know better: we should condemn all
companies</strong></del></span> <span class="inserted"><ins><em>headphone's
unique serial number.</p>
+
+ <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>take advantage of people like him. Indeed, it
is</strong></del></span> <span class="inserted"><ins><em>this was done
without</em></ins></span> the <span
class="removed"><del><strong>acceptance</strong></del></span> <span
class="inserted"><ins><em>users' consent.
+ If the fine print</em></ins></span> of
+<span class="removed"><del><strong>their unjust practice</strong></del></span>
<span class="inserted"><ins><em>the app said</em></ins></span> that <span
class="removed"><del><strong>teaches people to</strong></del></span> <span
class="inserted"><ins><em>users gave consent for this,
+ would that make it acceptable? No way! It should</em></ins></span> be
<span class="removed"><del><strong>doormats.</p>
</li>
<li>
-<p>HP “storage appliances” that use</strong></del></span>
<span class="inserted"><ins><em>app would record</em></ins></span> the <span
class="removed"><del><strong>proprietary
-“Left Hand” operating system have back doors that give HP
-<a
-href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-remote login access</a></strong></del></span> <span
class="inserted"><ins><em>names of the audio files users
listen</em></ins></span> to <span class="removed"><del><strong>them. HP
claims</strong></del></span>
- <span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
-
- <p>The suit accuses</em></ins></span> that this <span
class="removed"><del><strong>does not give HP
-access to</strong></del></span> <span class="inserted"><ins><em>was done
without</em></ins></span> the <span class="removed"><del><strong>customer's
data, but if</strong></del></span> <span class="inserted"><ins><em>users'
consent.
- If</em></ins></span> the <span class="removed"><del><strong>back door
allows
-installation</strong></del></span> <span class="inserted"><ins><em>fine
print</em></ins></span> of <span class="removed"><del><strong>software changes,
a change could be installed</strong></del></span> <span
class="inserted"><ins><em>the app said</em></ins></span> that <span
class="inserted"><ins><em>users gave consent for this,</em></ins></span>
- would <span class="removed"><del><strong>give access</strong></del></span>
<span class="inserted"><ins><em>that make it acceptable? No way! It should be
flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span
class="inserted"><ins><em>design</em></ins></span>
- the <span class="removed"><del><strong>customer's data.
-</p></strong></del></span> <span class="inserted"><ins><em>app to snoop
at all</a>.</p></em></ins></span>
+<p>Philips “smart” lightbulbs</strong></del></span> <span
class="inserted"><ins><em>flat out</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+have been designed not</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span
class="removed"><del><strong>interact</strong></del></span> <span
class="inserted"><ins><em>design
+ the app to snoop at all</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
-Some D-Link routers</a> have a back door for changing settings
in</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704120">
- <p>Anova sabotaged users' cooking devices
- with</em></ins></span> a
-<span class="removed"><del><strong>dlink of an eye.</p>
+ <li id="M201704120">
+ <p>Anova sabotaged users' cooking devices</em></ins></span>
+ with <span class="removed"><del><strong>other companies' smart
+lightbulbs</a>.</p>
-<p>
-<a href="https://github.com/elvanderb/TCP-32764">Many models of routers
-have back doors</a>.</p>
+<p>If</strong></del></span> a <span class="removed"><del><strong>product
is “smart”, and you didn't build it, it is
+cleverly serving its manufacturer <em>against you</em>.</p>
</li>
<li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router has</strong></del></span> <span
class="inserted"><ins><em>downgrade that tethered them to</em></ins></span> a
<span class="removed"><del><strong>backdoor</a>.</p>
-</li>
+<p><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+DVDs and Bluray disks have DRM</a>.
+</p>
-<li>
-<p>The</strong></del></span> <span class="inserted"><ins><em>remote
server.</em></ins></span> <a <span
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer was designed with DRM</a>:
it</strong></del></span>
- <span
class="inserted"><ins><em>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
- users create an account on Anova's servers, their
cookers</em></ins></span> won't <span class="removed"><del><strong>accept
-third-party printing materials. It is the Keurig</strong></del></span>
- <span class="inserted"><ins><em>function</a>.</p>
- </li>
+<p>That page uses spin terms that favor DRM,
+including <a
href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+digital “rights” management</a>
+and <a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
+and it claims</strong></del></span> <span
class="inserted"><ins><em>downgrade</em></ins></span> that <span
class="removed"><del><strong>“artists” (rather than companies) are
+primarily responsible for putting digital restrictions management into
+these disks. Nonetheless, it is</strong></del></span> <span
class="inserted"><ins><em>tethered them to</em></ins></span> a <span
class="removed"><del><strong>reference for the facts.
+</p>
- <li id="M201703270">
- <p>When Miele's Internet</em></ins></span> of <span
class="removed"><del><strong>printers. Now it</strong></del></span>
- <span class="inserted"><ins><em>Stings hospital disinfectant
dishwasher</em></ins></span> is
-<span class="removed"><del><strong>being discontinued, which means that
eventually authorized materials won't
-be available and the printers may become unusable.</p>
+<p>Every Bluray disk (with few, rare exceptions) has DRM—so
+don't use Bluray disks!</p></strong></del></span> <span
class="inserted"><ins><em>remote server. <a
+
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
+ users create an account on Anova's servers, their cookers won't
+ function</a>.</p></em></ins></span>
+ </li>
-<p>With a</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
+ <li <span class="removed"><del><strong>id="cameras-bugs">
+<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>id="M201703270">
+ <p>When Miele's Internet</em></ins></span> of <span
class="removed"><del><strong>network-connected surveillance cameras
have</strong></del></span>
+ <span class="inserted"><ins><em>Stings hospital disinfectant dishwasher
is</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+security bugs that allow anyone</strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
-even be</strong></del></span> <span class="inserted"><ins><em>Internet, its
security is crap</a>.</p>
-
- <p>For example,</em></ins></span> a <span
class="removed"><del><strong>remote possibility.</p>
+ connected</em></ins></span> to <span class="removed"><del><strong>watch
through them</a>.</p>
+</li>
-<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>cracker can gain access to</em></ins></span> the
<span class="removed"><del><strong>author of that article says that there was
-“nothing wrong”</strong></del></span> <span
class="inserted"><ins><em>dishwasher's
- filesystem, infect it</em></ins></span> with <span
class="removed"><del><strong>designing</strong></del></span> <span
class="inserted"><ins><em>malware, and force</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>dishwasher</em></ins></span> to <span
class="removed"><del><strong>restrict users</strong></del></span> <span
class="inserted"><ins><em>launch
- attacks on other devices</em></ins></span> in the <span
class="removed"><del><strong>first place. This is like putting a “cheat
me and mistreat me”
-sign</strong></del></span> <span class="inserted"><ins><em>network. Since
these dishwashers are
- used in hospitals, such attacks could potentially put hundreds of
- lives at risk.</p>
+<li>
+<p>Samsung's “Smart Home” has a big</strong></del></span>
<span class="inserted"><ins><em>the Internet, its</em></ins></span> security
<span class="removed"><del><strong>hole; <a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized people can remotely control it</a>.</p>
+
+<p>Samsung claims that this</strong></del></span> is <span
class="removed"><del><strong>an “open” platform
so</strong></del></span> <span
class="inserted"><ins><em>crap</a>.</p>
+
+ <p>For example, a cracker can gain access to</em></ins></span> the
+<span class="removed"><del><strong>problem is partly</strong></del></span>
<span class="inserted"><ins><em>dishwasher's
+ filesystem, infect it with malware, and force</em></ins></span> the <span
class="removed"><del><strong>fault</strong></del></span> <span
class="inserted"><ins><em>dishwasher to launch
+ attacks on other devices in the network. Since these dishwashers are
+ used in hospitals, such attacks could potentially put
hundreds</em></ins></span> of
+ <span class="inserted"><ins><em>lives at risk.</p>
</li>
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on <span class="removed"><del><strong>your
chest. We should know better: we should condemn all companies
-that take advantage</strong></del></span> <span class="inserted"><ins><em>its
users through the proprietary control app</a>.</p>
+ was snooping on its users through the proprietary control
app</a>.</p>
- <p>The app was reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>people like him. Indeed,</strong></del></span>
<span class="inserted"><ins><em>the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was surrounded by a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>acceptance of</strong></del></span> <span
class="inserted"><ins><em>vibration frequency.</p>
+ <p>The</em></ins></span> app <span
class="removed"><del><strong>developers. That</strong></del></span> <span
class="inserted"><ins><em>was reporting the temperature of the vibrator minute
by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements
about</em></ins></span> their <span class="removed"><del><strong>unjust
practice</strong></del></span>
- <span class="inserted"><ins><em>products, rather than free software which
users could have checked
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
and changed.</p>
- <p>The company</em></ins></span> that <span
class="removed"><del><strong>teaches</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+ <p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about
how</em></ins></span> people <span
class="removed"><del><strong>to</strong></del></span>
- <span class="inserted"><ins><em>used it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>doormats.</p>
-</li>
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
-<li>
-<p>Philips “smart” lightbulbs <a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"></strong></del></span>
- <span class="inserted"><ins><em>true, but it doesn't really matter. If it
had sold the data to a data
- broker, the data broker would</em></ins></span> have been <span
class="removed"><del><strong>designed not</strong></del></span> <span
class="inserted"><ins><em>able</em></ins></span> to <span
class="removed"><del><strong>interact</strong></del></span> <span
class="inserted"><ins><em>figure out who the
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
user was.</p>
<p>Following this lawsuit, <a
@@ -492,68 +537,34 @@
</li>
<li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>other companies' smart
-lightbulbs</a>.</p>
-
-<p>If</strong></del></span> <span class="inserted"><ins><em>microphones
<a
+ <p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>product is “smart”, and you didn't
build it, it is
-cleverly serving its manufacturer <em>against you</em>.</p>
-</li>
-
-<li>
-<p><a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-DVDs and Bluray disks have DRM</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>way to access
the data</a> collected by the
- manufacturer's snooping.</p></em></ins></span>
-
- <p>That <span class="removed"><del><strong>page uses spin terms that
favor DRM,
-including <a
href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a>
-and <a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</em></ins></span> and <span
class="removed"><del><strong>it claims that “artists” (rather than
companies) are
-primarily responsible for putting digital restrictions management into
-these disks. Nonetheless, it is a reference for</strong></del></span> the
<span class="removed"><del><strong>facts.
-</p>
-
-<p>Every Bluray disk (with few, rare exceptions) has DRM—so
-don't use Bluray disks!</p>
-</li>
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
-<li id="cameras-bugs">
-<p>Over 70 brands of network-connected surveillance cameras have <a
-href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
-security bugs that allow anyone</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these
- conversations was unacceptable by itself.</p></em></ins></span>
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by itself.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Samsung's “Smart Home” has</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702200">
- <p>If you buy</em></ins></span> a <span
class="removed"><del><strong>big security hole;</strong></del></span> <span
class="inserted"><ins><em>used “smart”
- car, house, TV, refrigerator, etc., usually</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized people</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
- previous owners</em></ins></span> can <span
class="inserted"><ins><em>still</em></ins></span> remotely control
it</a>.</p>
-
-<span class="removed"><del><strong><p>Samsung
claims</strong></del></span>
- <span class="inserted"><ins><em></li>
+ <li id="M201702200">
+ <p>If you buy a used “smart”
+ car, house, TV, refrigerator, etc., usually <a
+
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+ previous owners can still remotely control it</a>.</p>
+ </li>
<li id="M201702060">
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</em></ins></span> that <span
class="removed"><del><strong>this</strong></del></span> is <span
class="removed"><del><strong>an “open” platform
so</strong></del></span> <span class="inserted"><ins><em>viewed on them, and
not just broadcasts and
- cable</a>. Even if</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>fault</strong></del></span> <span
class="inserted"><ins><em>user's own computer,
- the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>app developers. That is clearly
true</strong></del></span> <span class="inserted"><ins><em>a way to disable the
- surveillance, even</em></ins></span> if <span class="inserted"><ins><em>it
were not hidden as it was in these TVs,
- does not legitimize</em></ins></span> the <span
class="removed"><del><strong>apps are proprietary software.</p>
+ report everything that</em></ins></span> is <span
class="removed"><del><strong>clearly true</strong></del></span> <span
class="inserted"><ins><em>viewed on them, and not just broadcasts and
+ cable</a>. Even</em></ins></span> if the <span
class="removed"><del><strong>apps are proprietary software.</p>
-<p>Anything whose name is “Smart”</strong></del></span>
<span class="inserted"><ins><em>surveillance.</p>
+<p>Anything whose name</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>“Smart”</strong></del></span> <span
class="inserted"><ins><em>coming from the user's own computer,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p>
</li>
<li id="M201612230">
@@ -1211,7 +1222,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/11/04 21:58:29 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-appliances.de.po 25 Oct 2018 10:31:08 -0000 1.60
+++ malware-appliances.de.po 4 Nov 2018 21:58:29 -0000 1.61
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -108,6 +108,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-appliances.fr.po 3 Nov 2018 21:44:02 -0000 1.93
+++ malware-appliances.fr.po 4 Nov 2018 21:58:29 -0000 1.94
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-11-03 22:24+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-04 21:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-appliances.pot 25 Oct 2018 10:31:08 -0000 1.46
+++ malware-appliances.pot 4 Nov 2018 21:58:30 -0000 1.47
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a "
+"href=\"https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/\">
"
+"give the manufacturer an unencrypted copy of everything they "
+"see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a "
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- malware-appliances.ru.po 25 Oct 2018 17:00:14 -0000 1.125
+++ malware-appliances.ru.po 4 Nov 2018 21:58:30 -0000 1.126
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-10-01 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-04 21:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Printer manufacturers are very innovative—at blocking the use of "
"independent replacement ink cartridges. Their “security "
"upgrades” occasionally impose new forms of cartridge DRM. <a href="
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-surveillance.de-diff.html 30 Oct 2018 15:28:29 -0000
1.14
+++ proprietary-surveillance.de-diff.html 4 Nov 2018 21:58:30 -0000
1.15
@@ -522,12 +522,24 @@
Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>emails to
snoopers</a>.</p>
- <p>Google</strong></del></span> <span
class="inserted"><ins><em>spyware via
- BIOS</a> on Windows installs. Note that the specific
- sabotage method Lenovo used</em></ins></span> did not <span
class="removed"><del><strong>intend</strong></del></span> <span
class="inserted"><ins><em>affect GNU/Linux; also, a
+ <p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
+ BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
+ worked in various ways to prevent that, and deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares</strong></del></span> <span
class="inserted"><ins><em>specific
+ sabotage method Lenovo used did not affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft puts in its
- own malware</a>.</p>
+ href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
+ being nonfree. It also distributes</strong></del></span> its
+ own <span class="removed"><del><strong>nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
</li>
</ul>
@@ -546,28 +558,33 @@
<ul class="blurbs">
<li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</em></ins></span> to make <span
class="removed"><del><strong>these apps spy; on</strong></del></span> <span
class="inserted"><ins><em>sure they can't “fool”</em></ins></span>
- the <span class="removed"><del><strong>contrary, it
- worked in various ways</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
+ cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
+ users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
+ proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
+ <span class="removed"><del><strong>do.</p>
+
+ <p>Google could demand the source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>can't
“fool”</em></ins></span>
+ the
+ <span class="removed"><del><strong>source code
somehow</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>prevent that,</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>Edward
Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the <span
class="removed"><del><strong>snooping of these apps.</p>
+ them</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
- <p>On</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
- text messages, read call, location</em></ins></span> and
- <span class="removed"><del><strong>therefore shares
in</strong></del></span> <span class="inserted"><ins><em>web browsing history,
and
- read</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is designed to disguise
itself
- from investigation.</p>
+ <p>But since Google</strong></del></span> <span
class="inserted"><ins><em>phones on and off, listen to the microphone,
+ retrieve geo-location data from the GPS, take photographs, read
+ text messages, read call, location and web browsing history, and
+ read the contact list. This malware is designed to
disguise</em></ins></span> itself <span class="removed"><del><strong>develops
malicious apps,</strong></del></span>
+ <span class="inserted"><ins><em>from investigation.</p>
</li>
<li id="M201311120">
@@ -575,31 +592,19 @@
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here, it seems that this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>injustice of their
- being nonfree.</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
- phones have.</em></ins></span> It <span class="removed"><del><strong>also
distributes its own nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
-
- <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em><a
+ detail here, it seems that this does not operate via
+ the universal back door that</em></ins></span> we <span
class="inserted"><ins><em>know nearly all portable
+ phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>preventing
apps from
- cheating? There is no systematic way for Google, or Android
- users, to inspect executable proprietary apps to see what they
- do.</p>
-
- <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> the <span
class="removed"><del><strong>source code for these apps,</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
+ lots of bugs in the phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>study the
- source code somehow to determine whether they
mistreat</strong></del></span> users <span class="removed"><del><strong>in
- various ways. If it did a good job of this,</strong></del></span> <span
class="inserted"><ins><em>cannot stop
- them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>could more or less
- prevent such snooping, except when</strong></del></span> <span
class="inserted"><ins><em>will eventually require all new portable phones
+ will send their GPS location on remote command, and
users</em></ins></span> cannot <span class="removed"><del><strong>trust
+ Google</strong></del></span> <span class="inserted"><ins><em>stop
+ them</a>. (The US says it will eventually require all new portable
phones
to have GPS.)</p>
</li>
</ul>
@@ -612,14 +617,10 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>app developers are clever
- enough</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
+ <p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p>
+ illegal to study how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
@@ -634,184 +635,124 @@
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>protect us. We must demand release
of source code</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
- no way</em></ins></span> to <span class="inserted"><ins><em>tell
whether</em></ins></span> the
- <span class="removed"><del><strong>public, so we can
depend</strong></del></span> <span class="inserted"><ins><em>phone is
snooping</em></ins></span> on <span class="removed"><del><strong>each
other.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ fingerprint-scanning touch screen</a>—which would mean no way
+ to use it without having your fingerprints taken. Users would have
+ no way to tell whether the phone is snooping on them.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security
- of 283 Android VPN apps concluded that “in spite of the
- promises for privacy, security, and anonymity given by the
- majority of VPN apps—millions of users may be unawarely subject
- to poor security guarantees and abusive practices inflicted by
- VPN apps.”</p>
-
- <p>Following is a non-exhaustive list of proprietary VPN apps from
- the research paper that tracks and infringes the
privacy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant</strong></del></span> <span class="inserted"><ins><em>personal
data</em></ins></span> to <span class="removed"><del><strong>track users and
show</strong></del></span> <span class="inserted"><ins><em>Apple's
servers</a>. Big Brother can get</em></ins></span>
- them <span class="removed"><del><strong>targeted ads.</dd>
-
- <dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full
access</strong></del></span> <span class="inserted"><ins><em>from
there.</p>
+ <li id="M201611170">
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots of personal data to Apple's servers</a>. Big Brother can get
+ them from there.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload</em></ins></span> to
- <span class="removed"><del><strong>users' text messages.</dd>
-
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>Apple's servers all</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
- for other apps</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
- and <span class="removed"><del><strong>also core system logs. TigerVPN
developers
- have confirmed this.</dd>
+ <p>iThings automatically upload to Apple's servers all the photos
+ and videos they make.</p>
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it</strong></del></span> <span
class="inserted"><ins><em>videos they make.</p>
-
- <blockquote><p> iCloud Photo Library</em></ins></span> stores
<span class="removed"><del><strong>detailed logs</strong></del></span> <span
class="inserted"><ins><em>every photo</em></ins></span> and <span
class="removed"><del><strong>may turn</strong></del></span> <span
class="inserted"><ins><em>video you
- take, and keeps</em></ins></span> them <span
class="removed"><del><strong>over to the UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span
class="inserted"><ins><em>up</em></ins></span> to <span
class="inserted"><ins><em>date on all your devices. Any edits you
+ <blockquote><p> iCloud Photo Library stores every photo and
video you
+ take, and keeps them up to date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span>
- <span class="inserted"><ins><em>startup</em></ins></span> of <span
class="removed"><del><strong>the JS injection</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
- <p>There</em></ins></span> is <span class="inserted"><ins><em>a
way</em></ins></span> to <span class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but it's active by default so</em></ins></span> it <span
class="removed"><del><strong>redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>still counts as a
+ <p>There is a way to
+ <a href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but it's active by default so it still counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage</em></ins></span> of
this <span class="removed"><del><strong>app have
- confirmed that the non-premium version of the app does
- JavaScript injection for tracking and display ads.</dd>
- </dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span> <span
class="inserted"><ins><em>to <a
+ <p>Unknown people apparently took advantage of
this</em></ins></span> to <span class="removed"><del><strong>protect us. We
must demand release</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span class="removed"><del><strong>the
top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as
“free”,</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed to break Apple's
- security to get at them,</em></ins></span> but <span
class="removed"><del><strong>most</strong></del></span> <span
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span
class="removed"><del><strong>are not in fact</strong></del></span> <span
class="inserted"><ins><em>through</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ nude photos</em></ins></span> of <span class="removed"><del><strong>source
code</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed</em></ins></span> to <span
class="removed"><del><strong>the
+ public, so we</strong></del></span> <span class="inserted"><ins><em>break
Apple's
+ security to get at them, but NSA</em></ins></span> can <span
class="removed"><del><strong>depend on each
other.</p></strong></del></span> <span class="inserted"><ins><em>access
any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
-
<span class="removed"><del><strong><li>
- <p>Apps</strong></del></span>
+ <p>A</strong></del></span>
<span class="inserted"><ins><em><li id="M201409220">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>BART</strong></del></span> <span
class="inserted"><ins><em>the state</a>.</p>
-
- <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
-</li>
-
-<li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p></em></ins></span>
+ <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>privacy and</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+
+ <p>This may have improved with <a
+
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8</em></ins></span> security <span
class="inserted"><ins><em>improvements</a>; but <a
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
+ <li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
- data</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>exist
- for no possible purpose other than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></em></ins></span>
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>283 Android VPN apps concluded that “in
spite of the
+ promises</strong></del></span> <span class="inserted"><ins><em>iOS seem to
exist</em></ins></span>
+ for <span class="removed"><del><strong>privacy, security, and anonymity
given by</strong></del></span> <span class="inserted"><ins><em>no possible
purpose other than surveillance</a>. Here is</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject
+ to poor security guarantees</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201401100">
- <p>The</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
+ <li id="M201401100">
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
- get other info too.</p>
+ iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span class="removed"><del><strong>abusive practices
inflicted</strong></del></span>
+ <span class="inserted"><ins><em>get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing,
or it</em></ins></span>
- is <span class="removed"><del><strong>not enough
-to legitimize actions like this. At this point, most users have
-stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>totally incompetent</a>.</p>
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
+ is totally incompetent</a>.</p>
</li>
<li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>spell out
-what they are “consenting” to. Google should clearly
-and honestly identify the information it collects on</strong></del></span>
<span class="inserted"><ins><em>can be
+ tells Apple its geolocation</a></em></ins></span> by
+ <span class="removed"><del><strong>VPN apps.”</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>default, though that can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
+ <p>There</em></ins></span> is <span
class="inserted"><ins><em>also</em></ins></span> a <span
class="removed"><del><strong>non-exhaustive list of proprietary VPN apps from
+ the research paper that tracks and infringes the privacy of
+ users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant</strong></del></span> <span class="inserted"><ins><em>feature for
web sites</em></ins></span> to track <span class="removed"><del><strong>users
and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>users, which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
- still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="removed"><del><strong>has full
access</strong></del></span> <span class="inserted"><ins><em>is
+ still true in iOS 7.)</p>
</li>
<li id="M201204280">
- <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
- email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>receiving
the verification code Apple sends
- to it.</p>
+ to
+ <span class="removed"><del><strong>users' text messages.</dd>
+
+ <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>receiving</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>verification
code Apple sends</em></ins></span>
+ to <span class="removed"><del><strong>read logs</strong></del></span>
<span class="inserted"><ins><em>it.</p>
</li>
</ul>
@@ -823,545 +764,525 @@
<ul class="blurbs">
<li id="M201711210">
- <p>Android tracks location for Google <a
+ <p>Android tracks location</em></ins></span> for <span
class="removed"><del><strong>other apps and also core system logs. TigerVPN
developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ and may turn them over</strong></del></span> <span
class="inserted"><ins><em>Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
when</em></ins></span>
- the <span class="removed"><del><strong>first
-place!</p></strong></del></span> <span class="inserted"><ins><em>phone
has no SIM card</a>.</p>
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to
China</a>.</p></em></ins></span>
+ sold with spyware sending lots of data</em></ins></span> to <span
class="inserted"><ins><em>China</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609140"></em></ins></span>
+ <li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ tracks</em></ins></span> the <span class="removed"><del><strong>UK
government</strong></del></span> <span class="inserted"><ins><em>users'
movements without their permission</a>.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself to completely stop the tracking. This is
- yet another example of nonfree software pretending to obey the user,
+ <p>Even</em></ins></span> if
+ <span class="removed"><del><strong>requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>you disable
Google Maps and location tracking, you must
+ disable Google Play itself</em></ins></span> to <span
class="inserted"><ins><em>completely stop</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated purpose of the JS
injection</strong></del></span> <span class="inserted"><ins><em>tracking.
This</em></ins></span> is
+ <span class="inserted"><ins><em>yet another example of nonfree software
pretending</em></ins></span> to <span class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span
class="inserted"><ins><em>obey</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
- <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+ <li id="M201507030">
+ <p>Samsung phones come with <a
+
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed</strong></del></span> <span class="inserted"><ins><em>they
send so much data</em></ins></span> that <span class="inserted"><ins><em>their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by</em></ins></span> the <span
class="removed"><del><strong>non-premium version</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
+ of <span class="removed"><del><strong>the app does
+ JavaScript injection for tracking and display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em>some
kind.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201507030">
- <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location information</a>
of</strong></del></span> <span class="inserted"><ins><em>they send so much data
that</em></ins></span> their <span class="removed"><del><strong>users with
third parties.</p></strong></del></span>
- <span class="inserted"><ins><em>transmission is a substantial expense for
users. Said transmission,
- not wanted or requested by the user, clearly must constitute spying
- of some kind.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120">
- <p><a href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</em></ins></span> to <span
class="inserted"><ins><em>any file on</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span> <span class="inserted"><ins><em>system.</p>
+ <span class="inserted"><ins><em><li id="M201403120"></em></ins></span>
+ <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+ proprietary</strong></del></span> <span
class="inserted"><ins><em>system.</p>
</li>
<li id="M201308010">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>the 500 most popular gratis</strong></del></span>
Android <span class="removed"><del><strong>apps</a>.</p>
+ <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps contained recognizable tracking libraries.
For
+ the paid proprietary apps, it was only 60%.</p>
- <p>The article should not have described these apps as
- “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to
say
- “zero price” is “gratis.”</p>
+ <p>The</strong></del></span> <span class="inserted"><ins><em>phones
(and Windows? laptops): The Wall Street
+ Journal (in an</em></ins></span> article <span
class="removed"><del><strong>confusingly describes gratis apps as
“free”,
+ but most of them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always</strong></del></span>
<span class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="removed"><del><strong>will fit
+ perfectly.</p>
+</li>
- <p>The</strong></del></span> <span class="inserted"><ins><em>Wall
Street
- Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
-
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
- the <span class="removed"><del><strong>usual analytics tools are
- legitimate, but</strong></del></span> <span class="inserted"><ins><em>FBI
can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+<li>
+ <p>Apps for BART</strong></del></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI</em></ins></span> can <span class="removed"><del><strong>only hope
that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234</strong></del></span> <span
class="inserted"><ins><em>remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps that track
users by</strong></del></span> <span class="inserted"><ins><em>phones
+ and laptops</a>. (I suspect this means Windows laptops.) Here
is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
<li id="M201307280">
- <p>Spyware</em></ins></span> is <span
class="inserted"><ins><em>present in some Android devices when they are
- sold. Some Motorola phones, made when this company was owned
- by Google, use a modified version of Android</em></ins></span> that <span
class="removed"><del><strong>valid? Software</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Spyware is present</em></ins></span> in <span
class="removed"><del><strong>stores or played</strong></del></span> <span
class="inserted"><ins><em>some Android devices when they are
+ sold. Some Motorola phones, made when this company was
owned</em></ins></span>
+ by <span class="removed"><del><strong>TV programs</a>.
+ </p>
+
+</li>
+
+<li>
+ <p>Pairs</strong></del></span> <span class="inserted"><ins><em>Google,
use a modified version</em></ins></span> of Android <span
class="removed"><del><strong>apps can collude to transmit
users'</strong></del></span> <span class="inserted"><ins><em>that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data to Motorola</a>.</p>
+ sends</em></ins></span> personal data to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola phone <a
-
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p></em></ins></span>
</li>
- <li id="M201302150">
- <p>Google Play intentionally sends app</em></ins></span> developers
<span class="removed"><del><strong>have no right</strong></del></span> <span
class="inserted"><ins><em><a
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201302150"></em></ins></span>
+ <p>Google Play intentionally sends app developers <a
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent” of users is not
enough</em></ins></span> to
- <span class="removed"><del><strong>analyze what</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most</em></ins></span> users <span class="removed"><del><strong>are
doing or how. “Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>have stopped
- reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>spell out what
- they</em></ins></span> are
- <span class="removed"><del><strong>just as wrong as any other
snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>“consenting” to. Google should
clearly</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span>
- <span class="inserted"><ins><em>honestly identify</em></ins></span> the
<span class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>information it collects on users, instead of
- hiding it</em></ins></span> in <span class="removed"><del><strong>some
Android devices when they are sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
-
- <p>However,</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send</strong></del></span> <span class="inserted"><ins><em>truly protect
people's privacy, we must prevent Google
- and other companies from getting this</em></ins></span> personal <span
class="removed"><del><strong>data to
Motorola</a>.</p></strong></del></span> <span
class="inserted"><ins><em>information in the
- first place!</p></em></ins></span>
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
+
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
- <span
class="removed"><del><strong><li><p>Some</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
+ when it's actually doing something else. Such</strong></del></span>
<span class="inserted"><ins><em><li id="M201111170">
- <p>Some</em></ins></span> manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier <span
class="removed"><del><strong>IQ.</a></p>
- </li>
+ <p>Some manufacturers add</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
+ unthinkable with free software.</p>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span
class="inserted"><ins><em>IQ</a>.</p></em></ins></span>
</li>
-</ul>
-
-
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div></strong></del></span>
+ <li><p>More than 73% of the most popular Android apps
+ <a href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of their users with third
parties.</p>
+ </li>
+ <li><p>“Cryptic communication,” unrelated to the
app's functionality,
+ was</strong></del></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span <span
class="removed"><del><strong>class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way to say
+ “zero price” is “gratis.”</p>
-<ul>
- <li><p>The DMCA and the EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing the iOS DRM.</p>
+ <p>The article takes for granted that the usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such</em></ins></span> as <span
class="removed"><del><strong>any other
snooping.</p></strong></del></span> <span
class="inserted"><ins><em>Carrier IQ</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+<span class="inserted"><ins><em></ul>
- <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
- obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p>
- </li>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether the phone is
snooping</strong></del></span> <span
class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and <a
+ <p>E-books can contain JavaScript code,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
<span class="inserted"><ins><em><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p>
+ sometimes this code snoops</em></ins></span> on <span
class="removed"><del><strong>the average.</p></strong></del></span> <span
class="inserted"><ins><em>readers</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span>
- <li id="M201410080">
+ <span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</em></ins></span> lots of <span
class="removed"><del><strong>personal</strong></del></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
+ the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"></em></ins></span>
+ send <span class="removed"><del><strong>personal</strong></del></span>
<span class="inserted"><ins><em>lots of</em></ins></span> data to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>Adobe</a>. Adobe's
“excuse”: it's
needed to check DRM!</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
<span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</strong></del></span>
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the user <span
class="removed"><del><strong>types into it</a>; the server records these
numbers for</strong></del></span> <span
class="inserted"><ins><em>reads</em></ins></span> at <span
class="removed"><del><strong>least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>what time</a>.</p></em></ins></span>
+ report even which page</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
-<span class="inserted"><ins><em></ul>
+
+
+<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareOnMobiles">Spyware
on Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
- <li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving a valid email address and receiving</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the <span class="removed"><del><strong>code Apple
- sends to it.</p>
- </li>
+<span class="removed"><del><strong><ul>
+ <li><p>The DMCA</strong></del></span>
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS</strong></del></span> <span
class="inserted"><ins><em>users that have deleted them</a>.</p>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google</em></ins></span> apps <span
class="inserted"><ins><em>on Android</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's</em></ins></span> location <span
class="removed"><del><strong>information</a></strong></del></span> <span
class="inserted"><ins><em>even when users disable “location
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other
kinds</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>location
- tracking, but most</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>will
be tricked by the misleading control.</p></em></ins></span>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201806110">
+ <li id="M201806110">
<p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>user's
movements</em></ins></span> and <span class="removed"><del><strong>keeps them
up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>listens
through</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>no</em></ins></span> way to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
- a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>recording. But I
can't be sure from the article.</p>
+ <p>I expect</em></ins></span> it <span
class="removed"><del><strong><a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span class="inserted"><ins><em>implements
DRM, too—that there is no way</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
+ would require circumventing</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If you learn</em></ins></span> to <span
class="inserted"><ins><em>care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p></em></ins></span>
</li>
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>the 5,855 Android
apps studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>get at them,
but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods</em></ins></span> of <span
class="removed"><del><strong>them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>snooping,</em></ins></span> in <span
class="removed"><del><strong>iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is,
- and get</strong></del></span> <span class="inserted"><ins><em>these
proprietary apps whose
- source code they cannot look at. The</em></ins></span> other <span
class="removed"><del><strong>info too.</p>
- </li>
+ <span
class="removed"><del><strong><li><p>In</strong></del></span>
- <li><p>There</strong></del></span> <span
class="inserted"><ins><em>apps might be snooping
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span class="removed"><del><strong>latest iThings
system, “turning off” WiFi</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
in other ways.</p>
- <p>This</em></ins></span> is <span class="removed"><del><strong>also
a feature for web sites</strong></del></span> <span
class="inserted"><ins><em>evidence that proprietary apps generally work against
+ <p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to <span class="removed"><del><strong>track users,
which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span> <span class="inserted"><ins><em>get rid of
the proprietary software—both proprietary
- Android</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but it
- is still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a></strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps</em></ins></span> by <span
class="removed"><del><strong>default, though</strong></del></span> <span
class="inserted"><ins><em>getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="removed"><del><strong>can be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>Bluetooth</strong></del></span> the
+ <span class="removed"><del><strong>obvious way</strong></del></span>
<span class="inserted"><ins><em>proprietary apps by getting apps from the free
software
+ only</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
the user if an app contains
anti-features</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
<span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
- companies</a>.</p>
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ —</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"></em></ins></span>
+ which <span class="removed"><del><strong>would mean no
way</strong></del></span> <span class="inserted"><ins><em>users are
HIV-positive, then provides the information</em></ins></span> to <span
class="removed"><del><strong>use it without having your fingerprints
+ taken. Users would</strong></del></span>
+ <span class="inserted"><ins><em>companies</a>.</p>
- <p>Grindr should not have so much information about its users.
+ <p>Grindr should not</em></ins></span> have <span
class="removed"><del><strong>no way</strong></del></span> <span
class="inserted"><ins><em>so much information about its users.
It could be designed so that users communicate such info to each
- other but not to</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>server's database.</p></em></ins></span>
+ other but not</em></ins></span> to <span class="removed"><del><strong>tell
whether</strong></del></span> the <span class="removed"><del><strong>phone is
snooping</strong></del></span> <span class="inserted"><ins><em>server's
database.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050">
+ <li id="M201803050">
<p>The moviepass app and dis-service
- spy</em></ins></span> on <span class="removed"><del><strong>all the data
in an iThing,
- or it is totally incompetent.</a></p>
- </li>
+ spy</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other</strong></del></span> <span
class="inserted"><ins><em>users even more</em></ins></span> than <span
class="removed"><del><strong>surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>users expected.
It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected.
It</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.</p>
+ where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Don't be tracked—pay cash!</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-<ul>
- <li><p>Tracking</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking</em></ins></span> software in popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers</em></ins></span> can
+ <span class="removed"><del><strong>get them from
there.</p></strong></del></span> <span class="inserted"><ins><em><a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
+ networks</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google</strong></del></span>
+ <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
<span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the</strong></del></span>
+ <p>The Sarahah</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all</em></ins></span> phone <span class="removed"><del><strong>has
no SIM card</a>.</p></li>
-
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data</strong></del></span> <span
class="inserted"><ins><em>numbers and email addresses</a> in user's
address
- book</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article misuses
the words
+ uploads all</em></ins></span> phone <span
class="removed"><del><strong>number</strong></del></span> <span
class="inserted"><ins><em>numbers and email addresses</a> in user's
address
+ book to developer's server. Note</em></ins></span> that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>user types into it</a>; the server records
these numbers for at least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>zero
price.</p>
+ referring to zero price.</p></em></ins></span>
</li>
- <li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden</strong></del></span>
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201707270">
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and</em></ins></span> text messages <span
class="removed"><del><strong>which enable them</strong></del></span> <span
class="inserted"><ins><em>and emails to snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
<p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
+ worked in various ways</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>prevent that,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends to it.</p>
+ </li>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
+
+ <p>On</em></ins></span> the <span class="removed"><del><strong>most
popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>other
hand, Google redistributes nonfree Android apps,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of their <span
class="removed"><del><strong>users with third parties.</p>
+ </li>
+
+ <li><p>iThings automatically upload to Apple's servers all the
photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a></strong></del></span> <span
class="inserted"><ins><em>being
+ nonfree. It also distributes its own nonfree apps, such</em></ins></span>
as <span class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud
feature is</strong></del></span> <span class="inserted"><ins><em>Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by the
+ startup</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
- to <span class="removed"><del><strong>turn the phones
- on and off, listen</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span>
to <span class="inserted"><ins><em>see what they do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>source code for these apps,</em></ins></span> and
<span class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span>
- the <span class="removed"><del><strong>contact list. This malware is
designed</strong></del></span> <span class="inserted"><ins><em>source code
somehow</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
- </li>
-
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and</strong></del></span> <span class="inserted"><ins><em>determine
whether</em></ins></span> they <span class="removed"><del><strong>send so much
data that their transmission is</strong></del></span> <span
class="inserted"><ins><em>mistreat users in
- various ways. If it did</em></ins></span> a
- <span class="removed"><del><strong>substantial expense for users. Said
transmission, not wanted</strong></del></span> <span
class="inserted"><ins><em>good job of this, it could more</em></ins></span> or
- <span class="removed"><del><strong>requested by</strong></del></span>
<span class="inserted"><ins><em>less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>user, clearly</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
+ <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span
class="inserted"><ins><em>preventing apps from
+ cheating? There</em></ins></span> is <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
+ to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>inspect executable
proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If</em></ins></span> it <span
class="removed"><del><strong>still counts as</strong></del></span> <span
class="inserted"><ins><em>did</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>good job</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>this, it could more or less
+ prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We</em></ins></span> must <span
class="removed"><del><strong>constitute spying</strong></del></span> <span
class="inserted"><ins><em>demand release</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span> <span
class="inserted"><ins><em>source code to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
+ Google</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release</em></ins></span>
of <span class="removed"><del><strong>many celebrities</a>. They needed
to break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>source
code</em></ins></span> to <span class="removed"><del><strong>get at them, but
NSA</strong></del></span> <span class="inserted"><ins><em>the
+ public, so we</em></ins></span> can <span
class="removed"><del><strong>access any of them through</strong></del></span>
<span class="inserted"><ins><em>depend on each other.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in Android
phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that</strong></del></span>
+ <li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</strong></del></span>
+ <li><p>Spyware in iThings:
+ the</strong></del></span>
<span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>remotely activate the GPS and microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>only hope that they don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track</em></ins></span> users
<span class="removed"><del><strong>cannot stop them:</strong></del></span>
<span class="inserted"><ins><em>by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable
phones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
- to <span class="removed"><del><strong>have
GPS.)</p></strong></del></span> <span
class="inserted"><ins><em>ultrasound from beacons placed in stores or played by
TV
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in</em></ins></span> stores <span
class="removed"><del><strong>determine exactly where the iThing is,
+ and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>or played by TV
programs</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The nonfree Snapchat
app's principal purpose is</strong></del></span>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
<span class="inserted"><ins><em><li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>restrict
- the use</strong></del></span> <span class="inserted"><ins><em>do
lots</em></ins></span> of <span class="removed"><del><strong>data on the user's
computer, but it does surveillance
- too:</strong></del></span> <span class="inserted"><ins><em>surveillance,
judging by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</em></ins></span> it <span
class="removed"><del><strong>tries</strong></del></span> <span
class="inserted"><ins><em>demands</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>personal data in</em></ins></span> the <span
class="removed"><del><strong>user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</em></ins></span> it
+ <span class="removed"><del><strong>is still true</strong></del></span>
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in
<span class="removed"><del><strong>iOS 7.)</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>the device</a>.</p></em></ins></span>
+ </li>
-<ul>
- <li>
- <p>The moviepass app and dis-service spy on users even more than
users
- expected. It</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
<span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to</strong></del></span>
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span
class="removed"><del><strong>movie</a>.
- </p>
-
- <p>Don't be tracked — pay cash!</p>
+ distributing a spyware app</em></ins></span> for <span
class="inserted"><ins><em>its headphones</a>.
Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>state</a>.</p>
</li>
- <li><p>AI-powered driving apps can
- <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>app would record</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>names of</em></ins></span> the <span
class="removed"><del><strong>data in an iThing,
+ or it is totally incompetent.</a></p>
</li>
- <li><p>The Sarahah</strong></del></span> <span
class="inserted"><ins><em>spyware</em></ins></span> app
- <span class="removed"><del><strong><a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book</strong></del></span> <span class="inserted"><ins><em>for its
headphones</a>. Specifically,
- the app would record the names of the audio files users
listen</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note</strong></del></span>
- <span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>audio files users listen to
+ along with the headphone's unique serial number.</p>
- <p>The suit accuses</em></ins></span> that this <span
class="removed"><del><strong>article misuses</strong></del></span> <span
class="inserted"><ins><em>was done without</em></ins></span> the <span
class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print</em></ins></span> of <span
class="removed"><del><strong>iOS seem to exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> the <span class="inserted"><ins><em>app said that
users gave consent for this,
+ would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li>
- <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>users' consent.
- If</em></ins></span> the <span class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>fine print of
the app said that users gave consent for this,
- would that make</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>acceptable? No way! It should</em></ins></span> be
<span class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span class="inserted"><ins><em>flat out
<a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app</em></ins></span> to <span class="removed"><del><strong>serve them
with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots</strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tracking software in popular</strong></del></span>
<span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs</em></ins></span> of <span
class="removed"><del><strong>surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span> <span
class="inserted"><ins><em>Android apps can collude</em></ins></span>
- to <span class="inserted"><ins><em>transmit users'</em></ins></span>
personal data <span class="removed"><del><strong>in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>to servers. <a
-
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ <p>Pairs of</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
+ sometimes very clever. Some trackers</strong></del></span> can <span
class="inserted"><ins><em>collude
+ to transmit users' personal data to servers.</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that
collude</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li><p>Android tracks
location for Google</strong></del></span>
- <span class="inserted"><ins><em><li id="M201703300"></em></ins></span>
- <p>Verizon <a
-
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ <span class="inserted"><ins><em><li id="M201703300">
+ <p>Verizon</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off,
even</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install
on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
+ about the users' searches that Google normally gets</em></ins></span> when
<span class="inserted"><ins><em>they use
its search engine.</p>
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the <span class="removed"><del><strong>app takes
effect. However,</strong></del></span> <span class="inserted"><ins><em>app
takes effect. However, the app
+ <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
+
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
+
+ <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to turn the
phones</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</em></ins></span> on <span
class="inserted"><ins><em>only one phone</a>,</em></ins></span> and <span
class="removed"><del><strong>off, listen to</strong></del></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>user must
+ explicitly opt-in before</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
</li>
@@ -1375,30 +1296,57 @@
<li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ movements before</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
<span class="inserted"><ins><em>ride</a>.</p>
<p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>designed to
+ disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>inadequate as a protection against
+ massive surveillance.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611160">
+ <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a></em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span
class="inserted"><ins><em>investigated the privacy</em></ins></span> and <span
class="removed"><del><strong>they send so much data</strong></del></span> <span
class="inserted"><ins><em>security of
+ 283 Android VPN apps concluded</em></ins></span> that <span
class="removed"><del><strong>their transmission is a
+ substantial expense</strong></del></span> <span
class="inserted"><ins><em>“in spite of the promises</em></ins></span>
+ for <span class="removed"><del><strong>users. Said transmission, not
wanted or
+ requested</strong></del></span> <span class="inserted"><ins><em>privacy,
security, and anonymity given</em></ins></span> by the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>majority</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
</li>
- <li id="M201611160">
- <p>A <a
-
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security of
- 283 Android VPN apps concluded that “in spite of the promises
- for privacy, security, and anonymity given by the majority of VPN
+ <li><p>Spyware in Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>VPN
apps—millions of users may be unawarely subject to poor security
- guarantees and abusive practices inflicted by VPN apps.”</p>
+ guarantees and abusive practices inflicted</em></ins></span> by <span
class="inserted"><ins><em>VPN apps.”</p>
+
+ <p>Following is</em></ins></span> a <span
class="removed"><del><strong>paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the
<span class="removed"><del><strong>GPS and microphone in Android
+ phones</strong></del></span> <span class="inserted"><ins><em>research
paper,
+ of some proprietary VPN apps that track users</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
+ (I suspect this means Windows laptops.) Here is
+ <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ </li>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
- privacy:</p>
+ <li><p>Portable phones with GPS will send</strong></del></span>
<span class="inserted"><ins><em>infringe</em></ins></span> their <span
class="removed"><del><strong>GPS location on
+ remote command</strong></del></span>
+ <span class="inserted"><ins><em>privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ <dd>Includes tracking libraries such as NativeX</em></ins></span>
and <span class="inserted"><ins><em>Appflood,
+ meant to track</em></ins></span> users <span
class="removed"><del><strong>cannot stop them:
+ <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says</strong></del></span> <span class="inserted"><ins><em>and
show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
@@ -1411,391 +1359,435 @@
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over to the UK government if requested.</dd>
+ <dd>Sends traffic to LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong>will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>stores detailed
logs and
+ may turn them over</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p>
+ </li>
+
+ <li><p>The nonfree Snapchat app's principal purpose
is</strong></del></span> <span class="inserted"><ins><em>the UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>HTML pages returned to the
- users. The stated purpose</em></ins></span> of <span
class="removed"><del><strong>spyware</strong></del></span> <span
class="inserted"><ins><em>the JS injection</em></ins></span> is
- <span class="removed"><del><strong>still spyware.</p>
+ <dd>Injects JavaScript code into the HTML pages
returned</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> the <span
class="removed"><del><strong>use</strong></del></span>
+ <span class="inserted"><ins><em>users. The stated
purpose</em></ins></span> of <span class="removed"><del><strong>data
on</strong></del></span> the <span class="removed"><del><strong>user's
computer, but it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span> <span class="inserted"><ins><em>JS
injection is</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
+ roughly five tracking libraries. Also, it redirects</em></ins></span>
the user's <span class="removed"><del><strong>list</strong></del></span>
+ <span class="inserted"><ins><em>traffic through valueclick.com (an
advertising website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses roughly
+ five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p>
</li>
+</ul>
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</strong></del></span> to <span class="removed"><del><strong>a
Chinese company</a>.</p></li>
- <li><p>A pregnancy test controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
- roughly five tracking libraries. Also, it redirects</em></ins></span>
the <span class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>user's
- traffic through valueclick.com (an advertising website).</dd>
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>in server accounts, it can
- alter them too</a>.
- </p></li>
+<ul>
+ <li>
+ <p>The moviepass</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> app <span
class="inserted"><ins><em>have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user</em></ins></span> and <span
class="removed"><del><strong>dis-service spy on users even more than users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.
+ </p>
- <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>also uses roughly
- five tracking libraries. Developers of this</em></ins></span> app <span
class="removed"><del><strong>tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span> <span
class="inserted"><ins><em>have confirmed that</em></ins></span>
- the <span class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span
class="inserted"><ins><em>non-premium version of</em></ins></span> the <span
class="removed"><del><strong>user's consent”</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection</em></ins></span> for
<span class="removed"><del><strong>surveillance is inadequate as a protection
against massive
- surveillance.</p></strong></del></span>
- <span class="inserted"><ins><em>tracking the user and displaying
ads.</dd>
+ <p>Don't be tracked — pay
cash!</p></strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
</dl></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Google's</strong></del></span>
+ <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
<span class="inserted"><ins><em><li id="M201609210">
- <p>Google's</em></ins></span> new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <span class="removed"><del><strong><li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></em></ins></span>
</li>
- <li><p>Facebook's</strong></del></span>
+ <span class="removed"><del><strong><li><p>The
Sarahah</strong></del></span>
<span class="inserted"><ins><em><li id="M201606050">
- <p>Facebook's</em></ins></span> new Magic Photo app <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"></em></ins></span>
- scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who is
- in the frame.</p>
+ <p>Facebook's new Magic Photo</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
+ and <span class="removed"><del><strong>email
addresses</a></strong></del></span> <span
class="inserted"><ins><em>suggests you to share the picture you take according
to who is</em></ins></span>
+ in <span class="removed"><del><strong>user's address
+ book</strong></del></span> <span class="inserted"><ins><em>the
frame.</p>
- <p>This spyware feature seems to require online access to some
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note that this article
misuses</strong></del></span> <span class="inserted"><ins><em>require online
access to some
known-faces database, which means the pictures are likely to be
sent across the wire to Facebook's servers and face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ even if</em></ins></span> the <span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>user
didn't “upload” them</em></ins></span> to <span
class="removed"><del><strong>zero price.</p></strong></del></span> <span
class="inserted"><ins><em>the service.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based</strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201605310">
+ <span class="inserted"><ins><em><li id="M201605310"></em></ins></span>
<p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM and snooping).</strong></del></span> <span
class="inserted"><ins><em>what people are listening to or
watching</a>.</em></ins></span> In <span
class="removed"><del><strong>August
- 2015</strong></del></span> <span class="inserted"><ins><em>addition,
+ snoop on what people are listening to or watching</a>. In addition,
it may be analyzing people's conversations to serve them with targeted
advertisements.</p>
</li>
- <li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server
accounts,</em></ins></span>
- it <span class="inserted"><ins><em>can alter them too</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots of surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data in the
device</a>.
+ </p>
</li>
- <li id="M201601130">
- <p>Apps that include</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased
snooping</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>TV programs</em></ins></span>
- are <span class="removed"><del><strong>starting</strong></del></span>
<span class="inserted"><ins><em>playing nearby</a>. Also on what users
post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ <li>
+ <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the
+ user must explicitly opt-in before the app takes effect. However, the
+ app remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
</li>
- <li id="M201511190">
- <p>“Cryptic communication,”
- unrelated</em></ins></span> to <span class="removed"><del><strong>realize
that it is nasty.</p>
+ <li><p>The Meitu photo-editing
+ app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
- <p>This article shows</strong></del></span> the <span
class="inserted"><ins><em>app's functionality, was</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ <li><p>A</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201604250">
+ <p>A</em></ins></span> pregnancy test controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy</em></ins></span> on many sorts of data in the phone, and in server
accounts,
+ it can alter them <span class="removed"><del><strong>too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
- <p>The article should not have described these
apps</em></ins></span> as <span
class="removed"><del><strong>a</strong></del></span>
- <span class="inserted"><ins><em>“free”—they are not free
software. The clear</em></ins></span> way
- to <span class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>say “zero price”</em></ins></span> is
<span class="removed"><del><strong>a typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
+ <p>This example illustrates how “getting the user's
consent”
+ for surveillance is inadequate as a protection against massive
+ surveillance.</p>
+ </li>
- <p>Out, out, damned Spotify!</p>
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
</li>
- <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</p>
- <p>The article takes</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
- apps</strong></del></span> <span class="inserted"><ins><em>granted
that</em></ins></span> the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>usual analytics tools are
- legitimate, but</em></ins></span> is <span class="inserted"><ins><em>that
valid? Software developers have no right to
- analyze what users are</em></ins></span> doing <span
class="removed"><del><strong>this in a way</strong></del></span> <span
class="inserted"><ins><em>or how. “Analytics”
tools</em></ins></span>
- that <span class="removed"><del><strong>at least is visible and
- optional</a>. Not</strong></del></span> <span
class="inserted"><ins><em>snoop are just</em></ins></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>wrong</em></ins></span> as <span
class="removed"><del><strong>what the others
do.</p></strong></del></span> <span class="inserted"><ins><em>any other
snooping.</p></em></ins></span>
+ <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601130">
+ <p>Apps</em></ins></span> that include <a
+
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on various sites
+ such as Facebook, Google+ and Twitter.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says
most</strong></del></span>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app
+ <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</strong></del></span>
- <span class="inserted"><ins><em><li id="M201510300">
- <p>More than 73% and 47% of</em></ins></span> mobile <span
class="removed"><del><strong>apps for children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ <span class="inserted"><ins><em><li id="M201511190">
+ <p>“Cryptic communication,”
+ unrelated</em></ins></span> to <span
class="removed"><del><strong>share</strong></del></span> the <span
class="removed"><del><strong>picture you take according to who
+ is</strong></del></span> <span class="inserted"><ins><em>app's
functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</em></ins></span> in the <span
class="removed"><del><strong>frame.</p>
+
+ <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>500 most popular
gratis Android apps</a>.</p>
+
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
+
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>usual analytics tools</em></ins></span> are <span
class="removed"><del><strong>likely to be
+ sent across the wire</strong></del></span>
+ <span class="inserted"><ins><em>legitimate, but is that valid? Software
developers have no right</em></ins></span> to <span
class="removed"><del><strong>Facebook's servers</strong></del></span>
+ <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
+ that snoop are just as wrong as any other snooping.</p>
</li>
- <li><p>Widely used</strong></del></span> <span
class="inserted"><ins><em>applications, from Android and iOS
- respectively</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
- personal, behavioral</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
+ <li id="M201510300">
+ <p>More than 73%</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
- <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>location information</a></em></ins></span> of
<span class="removed"><del><strong>whether the app developers
get</strong></del></span> <span
class="inserted"><ins><em>their</em></ins></span> users <span
class="removed"><del><strong>to say “I agree”. That is no excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>with
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>47%</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if the user didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>mobile
applications, from Android and iOS
+ respectively <a href="https://techscience.org/a/2015103001/">share
+ personal, behavioral and location information</a> of their users with
third parties.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Like</strong></del></span>
<span class="inserted"><ins><em><li id="M201508210">
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August
2015</em></ins></span> it <span class="removed"><del><strong>asked the
user</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Like</em></ins></span> most “music screaming”
disservices, Spotify is
+ based on proprietary malware (DRM and snooping). In August 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>, and some are starting</em></ins></span>
- to <span class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>realize that</em></ins></span> it <span
class="inserted"><ins><em>is nasty.</p>
+ demanded users submit to increased snooping</a>, and some are
starting
+ to realize that it is nasty.</p>
<p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way</em></ins></span> to
<span class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>“serve”
- users better</a>—never mind whether they want
that.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>is a
- typical example of</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>attitude</em></ins></span> of the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>proprietary</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>industry
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></em></ins></span>
+ twisted ways that they present snooping as a way to “serve”
+ users better</a>—never mind whether they want that. This is a
+ typical example of the attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Many</strong></del></span>
<span class="inserted"><ins><em><li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy was</strong></del></span> <span
class="inserted"><ins><em>2015</a></em></ins></span> found <span
class="removed"><del><strong>to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span> <span class="inserted"><ins><em>that
90%</em></ins></span> of the <span class="removed"><del><strong>conversation
between two users</a>.</p>
- </li>
-
- <li></strong></del></span> <span class="inserted"><ins><em>top-ranked
gratis proprietary
+ study in 2015</a> found that 90% of the top-ranked gratis proprietary
Android apps contained recognizable tracking libraries. For the paid
- proprietary apps, it was only 60%.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based</strong></del></span> <span
class="inserted"><ins><em>article confusingly describes gratis apps as
- “free”, but most of them are not</em></ins></span> in <span
class="removed"><del><strong>the U.S.</p>
+ proprietary apps, it was only 60%.</p>
- <p>Those toys</strong></del></span> <span
class="inserted"><ins><em>fact <a
- href="/philosophy/free-sw.html">free software</a>.
It</em></ins></span> also <span class="removed"><del><strong>contain major
security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>uses</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers</strong></del></span>
- <span class="inserted"><ins><em>ugly word “monetize”. A good
replacement for that word
+ <p>The article confusingly describes gratis apps as
+ “free”, but most of them are not in fact <a
+ href="/philosophy/free-sw.html">free software</a>. It also uses
the
+ ugly word “monetize”. A good replacement for that word
is “exploit”; nearly always that will fit perfectly.</p>
</li>
<li id="M201505060">
<p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>)
connect</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech,</strong></del></span> <span class="inserted"><ins><em>100 <a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
- and <span class="removed"><del><strong>even speak
- into</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on</em></ins></span> the
<span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>average.</p></em></ins></span>
+ href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on the average.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504060">
- <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
-
- <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>user</a>. This is in addition
to</em></ins></span>
- the <span class="removed"><del><strong>temperature
of</strong></del></span> <span class="inserted"><ins><em>snooping done
by</em></ins></span> the <span class="removed"><del><strong>vibrator
minute</strong></del></span> <span class="inserted"><ins><em>phone company, and
perhaps</em></ins></span> by
- <span class="removed"><del><strong>minute (thus, indirectly, whether it
was surrounded</strong></del></span> <span class="inserted"><ins><em>the OS in
+ <li id="M201504060">
+ <p>Widely used <a
+
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in
the phone.</p>
- <p>Don't be distracted</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as</strong></del></span> the <span
class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>question of whether</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>app developers
- get</em></ins></span> users <span class="removed"><del><strong>could have
- checked and changed.</p>
-
- <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>to say “I agree”. That is no excuse for
+ <p>Don't be distracted by the question of whether the app developers
+ get users to say “I agree”. That is no excuse for
malware.</p>
</li>
<li id="M201411260">
- <p>Many proprietary apps for mobile devices
- report which other apps</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>user has installed.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ <p>Many</em></ins></span> proprietary apps for mobile devices
+ report which other apps the user has installed. <a
+ href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
is doing this in a way that at least is visible and optional</a>. Not
as bad as what the others do.</p>
</li>
- <li id="M201401151">
- <p>The Simeji keyboard is a smartphone version</em></ins></span> of
<span class="removed"><del><strong>personal information about how
- people used it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Baidu's <a
- href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ <span class="removed"><del><strong><li><p>FTC says most mobile
apps for children don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ </li>
+
+ <li><p>Widely used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401151">
+ <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>.
This</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
</li>
- <li id="M201312270"></em></ins></span>
- <p>The <span class="removed"><del><strong>company's statement that
it was anonymizing</strong></del></span> <span
class="inserted"><ins><em>nonfree Snapchat app's principal purpose is to
restrict</em></ins></span> the
- <span class="inserted"><ins><em>use of</em></ins></span> data <span
class="removed"><del><strong>may be
- true,</strong></del></span> <span class="inserted"><ins><em>on the
user's computer,</em></ins></span> but it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
<span class="inserted"><ins><em>does surveillance too: <a
+ <li id="M201312270">
+ <p>The nonfree Snapchat app's principal purpose</em></ins></span> is
<span class="removed"><del><strong>in addition</strong></del></span> to <span
class="inserted"><ins><em>restrict</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by the question</strong></del></span>
+ <span class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>data on</em></ins></span> the <span
class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>user's
computer, but it does surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers</a>.</p>
+ it tries</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>get
the user's list of other people's phone
+ numbers</a>.</p></em></ins></span>
</li>
- <li id="M201312060">
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies</a>.</p>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <p>The FTC criticized this app because</em></ins></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>asked</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> to <span
class="removed"><del><strong>a</strong></del></span>
- <span class="inserted"><ins><em>approve sending personal</em></ins></span>
data <span class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>to</em></ins></span> the <span
class="removed"><del><strong>data broker would have been
able</strong></del></span> <span class="inserted"><ins><em>app developer but
did not ask
- about sending it</em></ins></span> to <span
class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>other
companies. This shows</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
+ <span class="inserted"><ins><em><li id="M201312060">
+ <p>The</em></ins></span> Brightest Flashlight app <a
+
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by <span
class="removed"><del><strong>companies.</a></p></strong></del></span>
<span
class="inserted"><ins><em>companies</a>.</p></em></ins></span>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>weakness of</em></ins></span>
- the <span class="removed"><del><strong>company has been
ordered</strong></del></span> <span
class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution”</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span>
- <span class="inserted"><ins><em>surveillance: why should</em></ins></span>
a <span class="removed"><del><strong>total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>flashlight
app send any information</em></ins></span> to <span
class="removed"><del><strong>its customers.</p></strong></del></span>
- <span class="inserted"><ins><em>anyone? A free software flashlight app
would not.</p></em></ins></span>
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not ask
+ about sending it to other companies. This shows the weakness of
+ the reject-it-if-you-dislike-snooping “solution” to
+ surveillance: why should a flashlight app send any information to
+ anyone? A free software flashlight app would not.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
<span class="inserted"><ins><em><li id="M201212100">
- <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <p>FTC says most mobile apps for children don't respect privacy:
<a
+
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
+ </li></em></ins></span>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInToys">#SpywareInToys</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+
+ <li>
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of the conversation between two users</a>.</p>
+ </li>
+
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers to listen in on a child's speech, and even speak
+ into the toys themselves.</p>
+ </li>
+
+ <li>
+ <p>A computerized vibrator</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201307110">
- <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way to access the data</a>
- collected by the manufacturer's snooping.</p>
+ <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
- <p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users could have
+ checked and changed.</p>
- <li><p>Barbie</strong></del></span>
+ <p>The company that made the vibrator</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
- Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
+ Microsoft changed Skype</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></em></ins></span>
+ specifically</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInGames">Games</h4></em></ins></span>
- <span <span class="removed"><del><strong>class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInGames">Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li>
- <p>An LG “smart” watch</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201806240">
- <p>Red Shell</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>a spyware that
- is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p>
+ <p>Red Shell is a spyware</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the</strong></del></span>
+ <span class="inserted"><ins><em>is found in many proprietary games. It
<a
+
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks</em></ins></span> data <span class="removed"><del><strong>may be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>on users' computers and sends</em></ins></span> it
<span class="removed"><del><strong>had sold the data</strong></del></span> to
<span class="inserted"><ins><em>third parties</a>.</p>
</li>
<li id="M201804144">
- <p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
- multiplayer game Guild War 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on</em></ins></span> its <span
class="removed"><del><strong>location</strong></del></span> <span
class="inserted"><ins><em>user's computer</a>.</p>
- </li>
+ <p>ArenaNet surreptitiously installed</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>spyware
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who</strong></del></span> the <span class="removed"><del><strong>user
was.</p>
+
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>massive
+ multiplayer game Guild War 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of
C$4m</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"></em></ins></span>
+ to <span class="inserted"><ins><em>snoop on all open processes running
on</em></ins></span> its <span
class="removed"><del><strong>customers.</p></strong></del></span> <span
class="inserted"><ins><em>user's computer</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711070">
+ <p>The driver for</em></ins></span> a <span
class="removed"><del><strong>way to access the data</a>
+ collected by the manufacturer's snooping.</p>
- <li id="M201711070">
- <p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information</em></ins></span> to <span
class="removed"><del><strong>someone else</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ <p>That the manufacturer and the FBI could listen to these
conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>certain gaming keyboard</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ information</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
</li>
<li id="M201512290">
<p>Many <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users</em></ins></span> and <span
class="inserted"><ins><em>report</em></ins></span> to <span
class="removed"><del><strong>transmit
- conversations too</a>.</p>
+ video game consoles snoop</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>their users</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
</li>
- <li></strong></del></span> <span class="inserted"><ins><em>the
- internet</a>—even what their users
weigh.</p></em></ins></span>
+</ul>
+
+
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>report</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>A <span class="removed"><del><strong>very cheap “smart
watch” comes</strong></del></span> <span class="inserted"><ins><em>game
console is a computer, and you can't trust a computer</em></ins></span> with
<span class="removed"><del><strong>an Android app</strong></del></span>
- <span class="inserted"><ins><em>a nonfree operating system.</p>
+<ul>
+ <li>
+ <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>the
+ internet</a>—even what their users weigh.</p>
+
+ <p>A game console</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a computer with
+ a nonfree operating system.</p>
</li>
<li id="M201509160">
- <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
<span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks</em></ins></span>
that <span class="removed"><del><strong>connects to an unidentified site in
China</a>.</p>
- <p>The article says</strong></del></span> <span
class="inserted"><ins><em>merge the data
+ <p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use</em></ins></span> this <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>data to manipulate people to buy things, and hunt for
- “whales” who can be led to spend a lot of money. They also
+ <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>report its location</strong></del></span> <span
class="inserted"><ins><em>manipulate people</em></ins></span> to <span
class="removed"><del><strong>someone else</strong></del></span> <span
class="inserted"><ins><em>buy things,</em></ins></span> and <span
class="inserted"><ins><em>hunt for
+ “whales” who can be led</em></ins></span> to <span
class="removed"><del><strong>transmit
+ conversations too</a>.</p>
+ </li>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android app
+ <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
+ <p>The article says this is</strong></del></span> <span
class="inserted"><ins><em>spend a lot of money. They also
use</em></ins></span> a back <span class="removed"><del><strong>door,
but</strong></del></span> <span class="inserted"><ins><em>door to manipulate
the game play for specific players.</p>
<p>While the article describes gratis games, games</em></ins></span>
that <span class="removed"><del><strong>could be a
@@ -1837,201 +1829,177 @@
<!-- #SpywareAtWork -->
<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
- to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>spy through it
too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>spy through it
too</a>. Here's information</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about</em></ins></span> NSA <span class="removed"><del><strong>To
Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect the emails</strong></del></span>
<span class="inserted"><ins><em>app spying</a>.</p>
</li>
<li id="M200510200">
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's computer and
sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ spies on every process running on a gamer's computer and sniffs a
+ good deal</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>personal data</a>, including
lots</em></ins></span> of <span class="removed"><del><strong>Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>activities which
+ have nothing to do with cheating.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+</ul>
-<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtWork">Spyware at
Work</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtWork">#SpywareAtWork</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-section">
+ <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>Skype</h4></strong></del></span> <span
class="inserted"><ins><em>Connected Equipment</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
</div>
-<div style="clear: left;"></div>
<span class="removed"><del><strong><ul>
- <li><p>Investigation
- Shows</strong></del></span>
+ <li><p>Spyware</strong></del></span>
+<span class="inserted"><ins><em><div style="clear: left;"></div>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span>
+ <p>The bad security</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass it through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>people that use them</a>.</p>
+ to snoop on the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <p>It is unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
</ul>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
-</div>
-
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
-<span class="inserted"><ins><em><p>Emo Phillips made a joke: The other
day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul class="blurbs">
- <li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
-
- <p>We link to the article</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702060">
- <p>Vizio “smart” <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
- </li>
- <li id="M201511130">
- <p>Some web and TV advertisements play inaudible
- sounds</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>be picked up by proprietary malware
running</em></ins></span>
- on <span class="removed"><del><strong>The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-<div style="clear: left;"></div>
+<div style="clear: left;"></div></strong></del></span>
+
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>other devices</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInTVSets">TV
Sets</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li>
- <p>Every “home security” camera, if its
manufacturer</strong></del></span> <span class="inserted"><ins><em>range so as
to determine that they
- are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>communicate</strong></del></span> <span
class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="removed"><del><strong>it,
- is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>Web activity, and other</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer,
based</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
- </li>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,
+ is</strong></del></span>
- <li id="M201511060">
- <p>Vizio goes a step further than other TV
- manufacturers in spying</em></ins></span> on <span
class="removed"><del><strong>the fact</strong></del></span> <span
class="inserted"><ins><em>their users: their <a
-
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</em></ins></span> that <span
class="removed"><del><strong>the device</strong></del></span> <span
class="inserted"><ins><em>advertisers can track you
- across devices.</p>
+<span class="inserted"><ins><em><p>Emo Phillips made</em></ins></span> a
<span class="removed"><del><strong>surveillance device. <a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by the manufacturer,
based</strong></del></span> <span class="inserted"><ins><em>joke: The other day
a woman came up to me and
+said, “Didn't I see you</em></ins></span> on <span
class="inserted"><ins><em>television?” I said, “I
+don't know. You can't see out</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>other way.” Evidently</em></ins></span> that
<span class="removed"><del><strong>the device is tethered
to</strong></del></span> <span class="inserted"><ins><em>was
+before Amazon “smart” TVs.</p>
- <p>It</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
+<ul class="blurbs">
+ <li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span class="inserted"><ins><em>turn
this off, but having</em></ins></span> it <span
class="removed"><del><strong>also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>enabled by default
- is an injustice already.</p>
- </li>
+ <p>But</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
- <li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>600 millions social
media profiles</em></ins></span> the company
- <span class="inserted"><ins><em>already monitors. Tivo customers are
unaware they're
- being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users to new combined</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
+ <p>We link to the article for the facts</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>presents. It
+ is too bad</em></ins></span> that the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the
<span class="removed"><del><strong>company
+ surveillance capability.</p></strong></del></span>
+ <span class="inserted"><ins><em>moral weakness of surrendering to Netflix.
The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>The Nest Cam</strong></del></span>
- <span class="inserted"><ins><em><li id="M201507240">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs recognize and</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are</em></ins></span> watching</a>, even <span
class="removed"><del><strong>when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is
using</strong></del></span> <span
class="inserted"><ins><em>if</em></ins></span> it <span
class="removed"><del><strong>to outsmart
- you.</p>
+ <span class="inserted"><ins><em><li id="M201702060">
+ <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when the “owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts and
+ cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>coming from the user's own computer,
+ the TV reports what</em></ins></span> it <span
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p></strong></del></span> <span
class="inserted"><ins><em>disable the
+ surveillance, even if it were not hidden as it was in these TVs,
+ does not legitimize the surveillance.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511130">
+ <p>Some web and TV advertisements play inaudible
+ sounds to be picked up by proprietary malware running
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul>
- <li><p>E-books can contain JavaScript code,
- and</strong></del></span> <span class="inserted"><ins><em>isn't a TV
channel.</p>
+ <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>range so as to determine that they
+ are nearby. Once your Internet devices are paired with
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>contain JavaScript code,</strong></del></span>
<span class="inserted"><ins><em>correlate ads with Web
activity,</em></ins></span> and <span
class="inserted"><ins><em>other</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"></em></ins></span>
- snoops on <span class="removed"><del><strong>readers</a>.</p>
- </li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
- <li><p>Spyware in many e-readers—not only the
+ <span class="inserted"><ins><em><li id="M201511060">
+ <p>Vizio goes a step further than other TV
+ manufacturers</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only the
Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report</strong></del></span> <span class="inserted"><ins><em>what
programs people watch, and</em></ins></span> even <span
class="removed"><del><strong>which page the user reads at</strong></del></span>
what <span class="removed"><del><strong>time</a>.</p>
+ they report even which page the user reads at what
time</a>.</p>
</li>
<li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>they
wanted</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ needed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so that advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ is an injustice already.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
<h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
@@ -2039,21 +2007,42 @@
</div>
<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+<li><p>Computerized cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>nonfree software</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers</em></ins></span> are <span
class="inserted"><ins><em>unaware they're
+ being watched by advertisers. By combining TV viewing
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>built-in cell phone modem which allows
effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
+ anyone</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
+ </li>
+
+ <li id="M201505290">
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
+ record</a>.</p>
+ </li>
+
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> when
<span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>first sold.</p>
@@ -2064,163 +2053,182 @@
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in the car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span class="inserted"><ins><em>and would then
have to give</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>US or some
+ authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time;</strong></del></span> <span class="inserted"><ins><em>be trusted
unless</em></ins></span> it is <span
class="removed"><del><strong>possible</strong></del></span> <span
class="inserted"><ins><em>done by free
- software in your own computer.</p>
+ <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>trusted
unless it is done by free</em></ins></span>
+ software in <span class="removed"><del><strong>the
car</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span class="inserted"><ins><em>third
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span class="removed"><del><strong>cell
phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
+ <p>The Amazon “Smart” TV</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ <li id="M201409290">
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their</em></ins></span> users</a>.</p>
+
+ <span class="removed"><del><strong><p>Even if no one
connects</strong></del></span>
- <p>The <span class="removed"><del><strong>case</strong></del></span>
<span class="inserted"><ins><em>report was as</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned
in</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect</em></ins></span> this <span class="removed"><del><strong>article, is not
- really a matter of proprietary surveillance. These
systems</strong></del></span> <span class="inserted"><ins><em>has got
+ <span class="inserted"><ins><em><p>The report was as of 2014, but we
don't expect this has got
better.</p>
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned</strong></del></span> <span class="inserted"><ins><em>TV
will
- say, “Without your consent to tracking, the TV will not
+ <p>This shows that laws requiring products</em></ins></span> to
<span class="inserted"><ins><em>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>track the car's movements
all</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware</strong></del></span>
<span class="inserted"><ins><em>not allowed to report what the
- user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>physically remove</strong></del></span>
<span class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span>
+ <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
</li>
- <li id="M201405200">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>LG
“smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>user watches, and</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>turn
this off has
- no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company
says</strong></del></span> <span class="inserted"><ins><em>transmission reports
a 404 error
- really means nothing; the server could save that data anyway.)</p>
-
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state orders</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software</strong></del></span> <span
class="inserted"><ins><em>id="M201405200">
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span> <span
class="inserted"><ins><em>LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available to car manufacturers, insurance companies, and
+ others.</p>
- <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
- product could spy this way.</p>
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware in the
car.</p></li>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
- </li>
+ <li><p>Tesla cars allow</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>user
watches,</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The company says it doesn't
+ store</strong></del></span> <span class="inserted"><ins><em>switch to
turn</em></ins></span> this <span class="removed"><del><strong>information, but
if</strong></del></span> <span class="inserted"><ins><em>off has
+ no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>transmission reports a 404 error
+ really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data
+ <span class="removed"><del><strong>and hand</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
- <li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a></em></ins></span>
- and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the
<span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>people who
are watching TV.</p></em></ins></span>
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>over, the state can store it.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul>
- <li><p>Lots</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201603220">
- <p>Over 70 brands</em></ins></span> of <span
class="removed"><del><strong>“smart” products are
- designed</strong></del></span> <span
class="inserted"><ins><em>network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>everyone in the house, all</strong></del></span>
<span class="inserted"><ins><em>watch through them</a>.</p>
- </li>
-
- <li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ <li><p>Lots of “smart” products are
+ designed</strong></del></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen to everyone in the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of
making a device that can obey your voice commands without
- potentially spying on you. Even if</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="inserted"><ins><em>“off.”</p>
+ potentially spying</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops</em></ins></span> on <span class="removed"><del><strong>you. Even
if it is air-gapped,</strong></del></span> <span
class="inserted"><ins><em>other devices on the user's local
network</a>.</p>
- <p>A “smart” device means the
manufacturer</em></ins></span> is <span
class="removed"><del><strong>air-gapped,</strong></del></span> <span
class="inserted"><ins><em>using</em></ins></span> it <span
class="removed"><del><strong>could be
+ <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch to stop this, but any
+ product</em></ins></span> could <span class="removed"><del><strong>be
saving up records about you for later examination.</p>
</li>
<li><p>Nest thermometers
- send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot of data about the user</a>.</p>
+ send</strong></del></span> <span class="inserted"><ins><em>spy this
way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots</em></ins></span> of <span class="removed"><del><strong>data about
the user</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
</li>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
Rent-to-own computers were programmed</strong></del></span>
- to <span class="removed"><del><strong>spy on their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
+
+ <span class="inserted"><ins><em><li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>woman came
up</strong></del></span> <span class="inserted"><ins><em>better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said,
“I</strong></del></span> <span class="inserted"><ins><em>look at what's
in the videos. That's not
+ security for your home. Security means making sure they</em></ins></span>
don't <span class="removed"><del><strong>know. You can't</strong></del></span>
<span class="inserted"><ins><em>get to</em></ins></span>
+ see <span class="removed"><del><strong>out the other way.” Evidently
that was
before Amazon “smart” TVs.</p>
<ul>
<li>
<p>Vizio
- “smart”</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The existence
of</strong></del></span> <span class="inserted"><ins><em>product as shipped
doesn't act as</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
- <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to
- <span class="removed"><del><strong>disable</strong></del></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span> <span class="inserted"><ins><em>code could surely
convert</em></ins></span> it
+ “smart”</strong></del></span> <span
class="inserted"><ins><em>through your camera.</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs</em></ins></span> that <span class="inserted"><ins><em>allow
anyone to watch through them</a>.</p>
+ </li>
+
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera</em></ins></span> is
<span class="removed"><del><strong>viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming
from</strong></del></span> <span class="inserted"><ins><em><a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span class="removed"><del><strong>user's
own
+ computer,</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
+
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>is. The existence of a way</strong></del></span>
+ to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not
hidden</strong></del></span> <span
class="inserted"><ins><em>product</em></ins></span> as <span
class="inserted"><ins><em>shipped doesn't act as a
+ listening device, remote changes to the code could surely
convert</em></ins></span> it
<span class="inserted"><ins><em>into one.</p>
</li>
@@ -2990,7 +2998,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 15:28:29 $
+$Date: 2018/11/04 21:58:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary-surveillance.de.po 30 Oct 2018 15:28:29 -0000 1.240
+++ proprietary-surveillance.de.po 4 Nov 2018 21:58:30 -0000 1.241
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -3359,6 +3359,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Over 70 brands of network-connected surveillance cameras have <a href="
"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
"html\"> security bugs that allow anyone to watch through them</a>."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- proprietary-surveillance.fr.po 30 Oct 2018 16:10:55 -0000 1.335
+++ proprietary-surveillance.fr.po 4 Nov 2018 21:58:30 -0000 1.336
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-10-30 17:10+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-04 21:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -2664,6 +2665,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Over 70 brands of network-connected surveillance cameras have <a href="
"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
"html\"> security bugs that allow anyone to watch through them</a>."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-surveillance.it-diff.html 30 Oct 2018 15:28:29 -0000
1.81
+++ proprietary-surveillance.it-diff.html 4 Nov 2018 21:58:30 -0000
1.82
@@ -1832,10 +1832,16 @@
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
- software in your own computer.</p>
+ software</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
- <p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+<ul>
+<li><p></strong></del></span> <span class="inserted"><ins><em>your
own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
@@ -1865,14 +1871,8 @@
</li>
<li id="M201405200">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span> <span class="inserted"><ins><em>LG
“smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
Note</strong></del></span> <span class="inserted"><ins><em>the switch to turn
this off has
no effect</a>. (The fact</em></ins></span> that the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
@@ -1907,61 +1907,71 @@
<p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+ product could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
+ </li>
+
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart”
TV</a>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li><p>Spyware in Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>had installed a patch to stop this, but any
- product could spy this way.</p>
+ Microsoft changed Skype</strong></del></span>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p></em></ins></span>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
- and use its camera to watch the people who are watching TV.</p>
- </li>
-</ul></em></ins></span>
-
+<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
+<ul>
<li></strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
@@ -2805,7 +2815,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 15:28:29 $
+$Date: 2018/11/04 21:58:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- proprietary-surveillance.it.po 30 Oct 2018 15:28:29 -0000 1.253
+++ proprietary-surveillance.it.po 4 Nov 2018 21:58:30 -0000 1.254
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -3087,6 +3087,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Over 70 brands of network-connected surveillance cameras have <a href="
"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
"html\"> security bugs that allow anyone to watch through them</a>."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary-surveillance.ja-diff.html 30 Oct 2018 15:28:29 -0000
1.92
+++ proprietary-surveillance.ja-diff.html 4 Nov 2018 21:58:30 -0000
1.93
@@ -1555,7 +1555,8 @@
companies.</p>
<p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows
install</strong></del></span> <span class="inserted"><ins><em>lot of money.
They also
+ “whales” who can be led to spend</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>lot of
money. They also
use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
@@ -1563,10 +1564,16 @@
</li>
<li id="M201401280">
- <p>Angry Birds <a
-
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
+ <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage</em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>spy through it
too</a>. Here's information on <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -1576,16 +1583,9 @@
</li>
<li id="M200510200">
- <p>Blizzard Warden</em></ins></span> is <span
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>a hidden
- “cheating-prevention” program that</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ <p>Blizzard Warden is a hidden
+ “cheating-prevention” program that <a
+ href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
spies</em></ins></span> on <span class="removed"><del><strong>top under
each subsection --></strong></del></span> <span
class="inserted"><ins><em>every process running on a gamer's computer and
sniffs a
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
@@ -1687,9 +1687,9 @@
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>coming from the user's own computer,
- the TV reports what</em></ins></span> it <span
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span
class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>disable the
- surveillance, even if it were not hidden as it was in these TVs,
+ the TV reports what it is. The existence of a way to disable the
+ surveillance, even if it were not hidden as</em></ins></span> it <span
class="removed"><del><strong>to outsmart
+ you.</p></strong></del></span> <span class="inserted"><ins><em>was
in these TVs,
does not legitimize the surveillance.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1718,22 +1718,31 @@
<span class="inserted"><ins><em><li id="M201511060">
<p>Vizio goes a step further than other TV
manufacturers</em></ins></span> in <span class="removed"><del><strong>many
e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>spying on their users: their</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span>
+ Kindle:</strong></del></span> <span class="inserted"><ins><em>spying on
their users: their</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ <p>It is possible to turn this off, but having it enabled by default
is an injustice already.</p></em></ins></span>
</li>
+
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million households
+ to</em></ins></span> the <span class="removed"><del><strong>e-reader
used</strong></del></span> <span class="inserted"><ins><em>600 millions social
media profiles the company
+ already monitors. Tivo customers are unaware they're
+ being watched</em></ins></span> by <span class="removed"><del><strong>most
US libraries,</strong></del></span> <span
class="inserted"><ins><em>advertisers. By combining TV viewing
+ information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>new
combined surveillance by default.</p></em></ins></span>
+ </li>
<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1742,25 +1751,15 @@
</div>
<ul>
-<li><p>Computerized cars</strong></del></span>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
- <span class="inserted"><ins><em><li id="M201511020">
- <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>nonfree software</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
- already monitors. Tivo customers</em></ins></span> are <span
class="inserted"><ins><em>unaware they're
- being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201507240">
+ <p>Vizio “smart” TVs recognize and</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Nissan Leaf
has</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507240">
- <p>Vizio “smart” TVs recognize and <a
- href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ <li><p>The Nissan Leaf has</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>built-in cell phone modem which allows
effectively
anyone</strong></del></span> <span class="inserted"><ins><em>TV
channel.</p>
@@ -1773,14 +1772,14 @@
snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>even what they wanted to
- record</a>.</p>
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>even what they wanted</em></ins></span> to
+ <span class="inserted"><ins><em>record</a>.</p>
</li>
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
+ used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no
authentication</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> when
<span class="removed"><del><strong>accessed through</strong></del></span>
<span class="inserted"><ins><em>first sold.</p>
</li>
@@ -1790,96 +1789,96 @@
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
Nuance can save</em></ins></span> it <span
class="removed"><del><strong>asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to the US or some
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in the car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span class="inserted"><ins><em>and would then
have to give</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> to the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not to</em></ins></span> be <span
class="removed"><del><strong>confident that Nissan has no
- access. The</strong></del></span> <span class="inserted"><ins><em>trusted
unless it is done by free</em></ins></span>
- software in <span class="removed"><del><strong>the
car</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
+ <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
+ the time;</strong></del></span> <span class="inserted"><ins><em>be trusted
unless</em></ins></span> it is <span class="removed"><del><strong>possible to
physically remove the cell phone modem
+ though.</p>
+ </li>
+
+ <li><p>Proprietary</strong></del></span> <span
class="inserted"><ins><em>done by free</em></ins></span>
+ software in <span class="removed"><del><strong>cars</strong></del></span>
<span class="inserted"><ins><em>your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive</em></ins></span> information <span
class="removed"><del><strong>about drivers' movements</a>,
+ which is made available</strong></del></span> <span
class="inserted"><ins><em>will be transmitted</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p></strong></del></span> <span
class="inserted"><ins><em>third
parties</a>.</p>
</li>
- <li id="M201411090">
- <p>The Amazon “Smart” TV</em></ins></span> is
- <span class="removed"><del><strong>proprietary,</strong></del></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ <li id="M201411090"></em></ins></span>
+ <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article,</strong></del></span> <span
class="inserted"><ins><em>Amazon “Smart” TV</em></ins></span> is
<span class="removed"><del><strong>not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
<li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their</em></ins></span> users</a>.</p>
+ on their users</a>.</p>
- <span class="removed"><del><strong><p>Even if no one
connects</strong></del></span>
-
- <span class="inserted"><ins><em><p>The report was as of 2014, but we
don't expect this has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be replaced with anonymous
+ payment systems,</strong></del></span> <span
class="inserted"><ins><em>2014,</em></ins></span> but <span
class="removed"><del><strong>the invasion isn't done by malware. The other
+ cases mentioned</strong></del></span> <span class="inserted"><ins><em>we
don't expect this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to
<span class="inserted"><ins><em>get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car remotely, the cell phone
- modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
- the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>tracking, the TV will not
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>done by proprietary malware
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
+ And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>TV will
+ say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>physically remove</strong></del></span>
<span class="inserted"><ins><em>report what</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span>
- <span class="inserted"><ins><em>user watches—no
exceptions!</p></em></ins></span>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the <span class="removed"><del><strong>car's location at
any time. (See</strong></del></span>
+ <span class="inserted"><ins><em>user watches—no exceptions!</p>
</li>
- <span class="removed"><del><strong><li><p>Proprietary
software</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405200">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>cars</strong></del></span> <span
class="inserted"><ins><em>LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance
companies,</strong></del></span>
+ <li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and
- <span class="removed"><del><strong>others.</p>
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data
+ <span class="removed"><del><strong>and hand</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
- <p>The case of toll-collection systems, mentioned
in</strong></del></span> <span class="inserted"><ins><em>the switch to
turn</em></ins></span> this <span class="removed"><del><strong>article, is not
- really</strong></del></span> <span class="inserted"><ins><em>off has
- no effect</a>. (The fact that the transmission
reports</em></ins></span> a <span class="removed"><del><strong>matter of
proprietary surveillance. These systems are an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>404 error
- really means nothing;</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware.
The</strong></del></span> <span class="inserted"><ins><em>server could save
that data anyway.)</p>
-
- <p>Even worse, it <a
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>over,</strong></del></span> <span
class="inserted"><ins><em><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on</em></ins></span> other
- <span class="removed"><del><strong>cases mentioned are done by
proprietary malware in the car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>devices on</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>user's
local network</a>.</p>
- <p>LG later said it had installed a patch</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine the car's location at</strong></del></span> <span
class="inserted"><ins><em>stop this, but</em></ins></span> any <span
class="removed"><del><strong>time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store</strong></del></span>
- <span class="inserted"><ins><em>product could spy</em></ins></span> this
<span class="removed"><del><strong>information, but if the state orders
it</strong></del></span> <span class="inserted"><ins><em>way.</p>
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy this way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ do lots of spying anyway</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201212170">
+ <span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>break security on a “smart”
TV</a></em></ins></span>
- and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the
<span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>people who
are watching TV.</p></em></ins></span>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>a
“smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
-</ul>
-
-
-<span class="removed"><del><strong><!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+</ul></em></ins></span>
<div <span class="removed"><del><strong>class="big-section">
@@ -1894,6 +1893,19 @@
Rent-to-own computers were programmed</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
+
<li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
@@ -2630,7 +2642,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 15:28:29 $
+$Date: 2018/11/04 21:58:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- proprietary-surveillance.ja.po 30 Oct 2018 15:28:29 -0000 1.226
+++ proprietary-surveillance.ja.po 4 Nov 2018 21:58:30 -0000 1.227
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -2573,6 +2573,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Over 70 brands of network-connected surveillance cameras have <a href="
"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
"html\"> security bugs that allow anyone to watch through them</a>."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary-surveillance.pot 30 Oct 2018 15:28:29 -0000 1.175
+++ proprietary-surveillance.pot 4 Nov 2018 21:58:30 -0000 1.176
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1836,6 +1836,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a "
+"href=\"https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/\">
"
+"give the manufacturer an unencrypted copy of everything they "
+"see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Over 70 brands of network-connected surveillance cameras have <a "
"href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">
"
"security bugs that allow anyone to watch through them</a>."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.425
retrieving revision 1.426
diff -u -b -r1.425 -r1.426
--- proprietary-surveillance.ru.po 1 Nov 2018 05:58:44 -0000 1.425
+++ proprietary-surveillance.ru.po 4 Nov 2018 21:58:30 -0000 1.426
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-10-26 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-04 21:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -2638,6 +2639,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Over 70 brands of network-connected surveillance cameras have <a href="
"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
"html\"> security bugs that allow anyone to watch through them</a>."
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.de.po 30 Oct 2018 15:28:29 -0000 1.61
+++ proprietary.de.po 4 Nov 2018 21:58:30 -0000 1.62
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -423,6 +423,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary.es.po 30 Oct 2018 15:28:29 -0000 1.60
+++ proprietary.es.po 4 Nov 2018 21:58:30 -0000 1.61
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-09-19 10:49+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -436,6 +436,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary.fr.po 30 Oct 2018 16:10:55 -0000 1.73
+++ proprietary.fr.po 4 Nov 2018 21:58:30 -0000 1.74
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-10-30 17:10+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-04 21:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -290,6 +291,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary.it-diff.html 30 Oct 2018 15:28:29 -0000 1.19
+++ proprietary.it-diff.html 4 Nov 2018 21:58:30 -0000 1.20
@@ -38,19 +38,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 40em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -179,6 +179,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
+
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
@@ -285,7 +298,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 15:28:29 $
+$Date: 2018/11/04 21:58:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary.it.po 30 Oct 2018 15:28:29 -0000 1.70
+++ proprietary.it.po 4 Nov 2018 21:58:30 -0000 1.71
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -427,6 +427,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary.ja-diff.html 30 Oct 2018 15:28:29 -0000 1.21
+++ proprietary.ja-diff.html 4 Nov 2018 21:58:30 -0000 1.22
@@ -40,8 +40,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -152,10 +152,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -176,6 +176,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
+
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
@@ -282,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 15:28:29 $
+$Date: 2018/11/04 21:58:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary.ja.po 30 Oct 2018 15:28:29 -0000 1.53
+++ proprietary.ja.po 4 Nov 2018 21:58:30 -0000 1.54
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -349,6 +349,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary.nl-diff.html 30 Oct 2018 15:28:29 -0000 1.19
+++ proprietary.nl-diff.html 4 Nov 2018 21:58:30 -0000 1.20
@@ -38,19 +38,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 40em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -97,19 +97,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
- <li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
</ul>
@@ -154,10 +154,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -179,6 +179,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
+
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
@@ -285,7 +298,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 15:28:29 $
+$Date: 2018/11/04 21:58:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary.nl.po 30 Oct 2018 15:28:29 -0000 1.43
+++ proprietary.nl.po 4 Nov 2018 21:58:30 -0000 1.44
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -420,6 +420,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary.pl-diff.html 30 Oct 2018 15:28:29 -0000 1.37
+++ proprietary.pl-diff.html 4 Nov 2018 21:58:30 -0000 1.38
@@ -153,10 +153,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -177,6 +177,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in the videos. That's not
+ security for your home. Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
+
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
@@ -283,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 15:28:29 $
+$Date: 2018/11/04 21:58:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary.pl.po 30 Oct 2018 15:28:29 -0000 1.38
+++ proprietary.pl.po 4 Nov 2018 21:58:30 -0000 1.39
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -501,6 +501,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary.pot 30 Oct 2018 15:28:30 -0000 1.35
+++ proprietary.pot 4 Nov 2018 21:58:30 -0000 1.36
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -241,6 +241,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a "
+"href=\"https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/\">
"
+"give the manufacturer an unencrypted copy of everything they "
+"see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a "
"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\">
"
"track the phones of users that have deleted them</a>."
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary.pt-br.po 30 Oct 2018 20:58:11 -0000 1.24
+++ proprietary.pt-br.po 4 Nov 2018 21:58:30 -0000 1.25
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-10-30 17:39-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-04 21:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -288,6 +289,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.ru.po 1 Nov 2018 05:58:44 -0000 1.97
+++ proprietary.ru.po 4 Nov 2018 21:58:30 -0000 1.98
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-10-30 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-04 21:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -294,6 +295,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary.zh-tw.po 30 Oct 2018 15:28:30 -0000 1.21
+++ proprietary.zh-tw.po 4 Nov 2018 21:58:30 -0000 1.22
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 15:25+0000\n"
+"POT-Creation-Date: 2018-11-04 21:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -338,6 +338,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Nearly all “home security cameras” <a href=\"https://www."
+"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
+"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
+"they see</a>. “Home insecurity camera” would be a better name!"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"When Consumer Reports tested them, it suggested that these manufacturers "
+"promise not to look at what's in the videos. That's not security for your "
+"home. Security means making sure they don't get to see through your camera."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary/po malware-appliances.de-diff.h...,
GNUN <=