[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Fri, 8 Feb 2019 03:59:39 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/08 03:59:37
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-amazon.it.po malware-apple.it.po
malware-microsoft.it.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-back-doors.it.po
proprietary-censorship.it.po
proprietary-drm.it.po
proprietary-insecurity.it.po
proprietary-sabotage.it.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary-tyrants.it.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.370&r2=1.371
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.463&r2=1.464
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.23&r2=1.24
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- de.po 7 Feb 2019 10:59:49 -0000 1.23
+++ de.po 8 Feb 2019 08:59:35 -0000 1.24
@@ -7145,6 +7145,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- es.po 7 Feb 2019 11:31:42 -0000 1.29
+++ es.po 8 Feb 2019 08:59:35 -0000 1.30
@@ -5059,6 +5059,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- fr.po 7 Feb 2019 13:27:55 -0000 1.43
+++ fr.po 8 Feb 2019 08:59:35 -0000 1.44
@@ -5627,6 +5627,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- it.po 7 Feb 2019 10:59:49 -0000 1.23
+++ it.po 8 Feb 2019 08:59:35 -0000 1.24
@@ -75,13 +75,24 @@
"sviluppatori, consapevoli dell'impossibilità da parte degli utenti di "
"riparare eventuali funzionalità malevole, sono tentati ad imporne."
+# || No change detected. The change might only be in amounts of spaces.
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <ul><li><p>
msgid ""
@@ -6718,6 +6729,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- ja.po 7 Feb 2019 10:59:49 -0000 1.23
+++ ja.po 8 Feb 2019 08:59:35 -0000 1.24
@@ -5706,6 +5706,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-amazon.it.po 14 Jan 2019 07:59:32 -0000 1.24
+++ malware-amazon.it.po 8 Feb 2019 08:59:35 -0000 1.25
@@ -57,12 +57,23 @@
"riparare eventuali funzionalità malevole, sono tentati ad imporne."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <p>
msgid ""
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-apple.it.po 6 Jan 2019 09:59:17 -0000 1.118
+++ malware-apple.it.po 8 Feb 2019 08:59:35 -0000 1.119
@@ -70,12 +70,23 @@
"riparare eventuali funzionalità malevole, sono tentati ad imporne."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <div><h3>
msgid "Type of malware"
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- malware-microsoft.it.po 3 Feb 2019 15:59:41 -0000 1.136
+++ malware-microsoft.it.po 8 Feb 2019 08:59:35 -0000 1.137
@@ -67,12 +67,23 @@
"riparare eventuali funzionalità malevole, sono tentati ad imporne."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <div><h3>
msgid "Type of malware"
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-mobiles.de-diff.html 4 Feb 2019 07:31:22 -0000 1.37
+++ malware-mobiles.de-diff.html 8 Feb 2019 08:59:35 -0000 1.38
@@ -456,6 +456,25 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
@@ -785,66 +804,67 @@
<p>Faceapp appears to do lots of surveillance, judging by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access</strong></del></span> <span
class="inserted"><ins><em>watching</a>. In addition,</em></ins></span>
- it <span class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span class="removed"><del><strong>personal
data in the device</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
- advertisements.</p></em></ins></span>
+ it <span class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
+ advertisements.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps</strong></del></span>
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of</em></ins></span> data in the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
- <span class="inserted"><ins><em><li id="M201604250">
- <p>A pregnancy test controller application not
only</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal data
- to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
- it can alter them too</a>.</p>
+<li>
+ <p>Pairs of Android apps</strong></del></span> <span
class="inserted"><ins><em>phone, and in server accounts,
+ it</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal data
+ to servers.</strong></del></span> <span class="inserted"><ins><em>alter
them too</a>.</p>
</li>
<li id="M201601130">
- <p>Apps</em></ins></span> that <span
class="removed"><del><strong>collude.</a></p></strong></del></span>
<span class="inserted"><ins><em>include <a
-
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p></em></ins></span>
+ such as Facebook, Google+ and Twitter.</p>
+ </li>
+
+ <li id="M201601110">
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude.</a></p></strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software to make sure they can't “fool”
+ the monitoring</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>Google Play intentionally sends app developers</strong></del></span>
- <span class="inserted"><ins><em><li id="M201601110">
- <p>The natural extension of monitoring
- people through “their” phones is</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't
“fool”</em></ins></span>
- the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
- </li>
-
- <li id="M201511190">
+ <span class="inserted"><ins><em><li id="M201511190">
<p>“Cryptic communication,”
- unrelated to</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
-
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span
class="removed"><del><strong>“consent” of users is not enough
-to legitimize actions like this. At this point,</strong></del></span> <span
class="inserted"><ins><em>500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
+ unrelated to the app's functionality, was</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</em></ins></span> the <span class="removed"><del><strong>personal
details of users</strong></del></span> <span class="inserted"><ins><em>500 most
popular gratis Android apps</a>.</p>
- <p>The article should not</em></ins></span> have
-<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>described these apps as
+ <p>The article should not have described these apps as
“free”—they are not free software. The clear way
to say “zero price” is “gratis.”</p>
- <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
- legitimate, but is</em></ins></span> that <span
class="removed"><del><strong>spell out</strong></del></span> <span
class="inserted"><ins><em>valid? Software developers have no right to
- analyze</em></ins></span> what <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+ <p>The article takes for granted</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
+
+<p>Merely asking</strong></del></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>usual analytics
tools are
+ legitimate, but</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em>that valid? Software developers have no
right</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most</strong></del></span>
+ <span class="inserted"><ins><em>analyze what</em></ins></span> users <span
class="removed"><del><strong>have
+stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>are doing or how. “Analytics”
tools</em></ins></span>
+ that <span class="removed"><del><strong>spell out
+what they</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
and honestly identify the information it collects on users, instead
of hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
-and</strong></del></span> <span class="inserted"><ins><em>doing or how.
“Analytics” tools
- that snoop are just as wrong as any</em></ins></span> other <span
class="removed"><del><strong>companies from getting this personal information
in the first
+and</strong></del></span> <span class="inserted"><ins><em>just as wrong as
any</em></ins></span> other <span class="removed"><del><strong>companies from
getting this personal information in the first
place!</p></strong></del></span> <span
class="inserted"><ins><em>snooping.</p></em></ins></span>
</li>
@@ -1205,7 +1225,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/02/08 08:59:35 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-mobiles.de.po 3 Feb 2019 15:59:41 -0000 1.94
+++ malware-mobiles.de.po 8 Feb 2019 08:59:35 -0000 1.95
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -759,6 +759,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-mobiles.es.po 7 Feb 2019 10:57:04 -0000 1.94
+++ malware-mobiles.es.po 8 Feb 2019 08:59:35 -0000 1.95
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -633,6 +634,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- malware-mobiles.fr.po 3 Feb 2019 19:44:25 -0000 1.116
+++ malware-mobiles.fr.po 8 Feb 2019 08:59:35 -0000 1.117
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2019-02-03 20:27+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -634,6 +635,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-mobiles.it-diff.html 4 Feb 2019 07:31:23 -0000 1.42
+++ malware-mobiles.it-diff.html 8 Feb 2019 08:59:36 -0000 1.43
@@ -462,6 +462,25 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
@@ -758,7 +777,7 @@
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it <span
class="removed"><del><strong>stores detailed logs
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed <span
class="removed"><del><strong>logs
and may turn them over to the UK government if
requested.</dd>
@@ -812,7 +831,7 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>stores detailed logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>logs and
may turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -1241,7 +1260,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-mobiles.it.po 3 Feb 2019 15:59:41 -0000 1.94
+++ malware-mobiles.it.po 8 Feb 2019 08:59:36 -0000 1.95
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -81,12 +81,23 @@
msgstr ""
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <ul><li><p>
msgid ""
@@ -717,6 +728,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-mobiles.ja-diff.html 4 Feb 2019 07:31:23 -0000 1.56
+++ malware-mobiles.ja-diff.html 8 Feb 2019 08:59:36 -0000 1.57
@@ -456,6 +456,25 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
@@ -1081,7 +1100,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- malware-mobiles.ja.po 3 Feb 2019 15:59:41 -0000 1.82
+++ malware-mobiles.ja.po 8 Feb 2019 08:59:36 -0000 1.83
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -598,6 +598,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-mobiles.pot 3 Feb 2019 15:59:41 -0000 1.60
+++ malware-mobiles.pot 8 Feb 2019 08:59:36 -0000 1.61
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -431,6 +431,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\"> 25% fail "
+"to protect their usersâ privacy</a> due to DNS leaks. In addition, 85% "
+"feature intrusive permissions or functions in their source code—often "
+"used for invasive advertising—that could potentially also be used to "
+"spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-app-investigation/\">half of the "
+"top 10 gratis VPN apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a "
+"href=\"/philosophy/free-sw.html\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a "
"href=\"https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\">
"
"stored users' locations to the company's server</a>. The company is being "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- malware-mobiles.ru.po 3 Feb 2019 16:30:30 -0000 1.148
+++ malware-mobiles.ru.po 8 Feb 2019 08:59:36 -0000 1.149
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -624,6 +625,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- nl.po 7 Feb 2019 10:59:49 -0000 1.23
+++ nl.po 8 Feb 2019 08:59:36 -0000 1.24
@@ -4488,6 +4488,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- pl.po 7 Feb 2019 10:59:49 -0000 1.23
+++ pl.po 8 Feb 2019 08:59:36 -0000 1.24
@@ -3934,6 +3934,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- pot 7 Feb 2019 10:59:49 -0000 1.23
+++ pot 8 Feb 2019 08:59:36 -0000 1.24
@@ -3757,6 +3757,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary-back-doors.it.po 19 Jan 2019 09:30:12 -0000 1.112
+++ proprietary-back-doors.it.po 8 Feb 2019 08:59:36 -0000 1.113
@@ -66,12 +66,23 @@
msgstr ""
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <p>
msgid ""
Index: proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-censorship.it.po 5 Jan 2019 11:31:34 -0000 1.52
+++ proprietary-censorship.it.po 8 Feb 2019 08:59:36 -0000 1.53
@@ -64,12 +64,23 @@
"censurare dovrebbe essere illegale, ma non lo è."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <h3>
msgid "Apple"
Index: proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary-drm.it.po 5 Jan 2019 11:31:34 -0000 1.50
+++ proprietary-drm.it.po 8 Feb 2019 08:59:36 -0000 1.51
@@ -79,12 +79,23 @@
"\">abolire il DRM</a>."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary-insecurity.it.po 5 Jan 2019 11:31:34 -0000 1.141
+++ proprietary-insecurity.it.po 8 Feb 2019 08:59:36 -0000 1.142
@@ -112,12 +112,23 @@
"nota."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary-sabotage.it.po 2 Feb 2019 13:31:31 -0000 1.103
+++ proprietary-sabotage.it.po 8 Feb 2019 08:59:36 -0000 1.104
@@ -59,12 +59,23 @@
"di una backdoor."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-surveillance.de-diff.html 7 Feb 2019 10:59:49 -0000
1.40
+++ proprietary-surveillance.de-diff.html 8 Feb 2019 08:59:36 -0000
1.41
@@ -1032,36 +1032,60 @@
</div>
<ul class="blurbs">
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi and Bluetooth</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the
- <span class="removed"><del><strong>obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ <li id="M201902010">
+ <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi and Bluetooth the
+ obvious way</strong></del></span> <span class="inserted"><ins><em>150
most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p>
+ That's Apple for you—“We know you want</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>be spied
on”.</p>
</li>
<li><p>Apple proposes
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>will do
- with</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>snooping on
- them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal</strong></del></span> <span
class="inserted"><ins><em>about a side issue. What the company does
- with the</em></ins></span> data <span class="removed"><del><strong>to
Apple's servers</a>. Big Brother can
- get them from there.</p>
- </li>
-
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
<span class="inserted"><ins><em>is</em></ins></span> a <span
class="removed"><del><strong>server every phone number</strong></del></span>
<span class="inserted"><ins><em>secondary issue. The principal wrong here
is</em></ins></span> that
- the <span class="removed"><del><strong>user types into it</a>; the
server records these numbers for</strong></del></span> <span
class="inserted"><ins><em>company gets that data</em></ins></span> at <span
class="removed"><del><strong>least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>all.</p>
+ — which would mean no way</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a>
due</em></ins></span> to <span class="removed"><del><strong>use it without
having your fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used</em></ins></span> to <span
class="removed"><del><strong>tell whether the phone is
snooping</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal data to Apple's
servers</a>. Big Brother can
+ get them from there.</p></strong></del></span>
+ <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901050">
+ <p>The Weather Channel</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding</em></ins></span> that <span
class="inserted"><ins><em>it notify</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>users of
what it will do
+ with</em></ins></span> the <span class="removed"><del><strong>server
records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>valid email address and
receiving</strong></del></span> <span class="inserted"><ins><em>side issue.
What</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>company does
+ with the data is a secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1069,242 +1093,248 @@
tracking people's locations.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even</strong></del></span>
+ <span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
<span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of</em></ins></span> gratis <span
class="removed"><del><strong>apps)</a>
- without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>code
Apple
- sends</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span class="removed"><del><strong>it.</p>
- </li>
-
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some</em></ins></span> of <span
class="inserted"><ins><em>them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>most popular
iOS</strong></del></span> <span class="inserted"><ins><em>user's activities in
the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
- </li>
-
- <li id="M201810244">
- <p>Some Android</em></ins></span> apps <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS</strong></del></span> <span
class="inserted"><ins><em>gratis Android</em></ins></span> apps <a <span
class="removed"><del><strong>class="not-a-duplicate"
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>that
have deleted them</a>.</p></em></ins></span>
+ behavioral and location information</a> of their users with third
parties.</p>
</li>
- <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
+ <li><p>iThings automatically upload to Apple's servers
all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span class="removed"><del><strong>photos
and
+ videos</strong></del></span> <span class="inserted"><ins><em>user's
actions to Facebook</a>.</p>
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>photos and
- videos they make.</p>
+ <p>Often</em></ins></span> they <span
class="removed"><del><strong>make.</p>
<blockquote><p>
iCloud Photo Library stores every photo and video you take,
and keeps them up to date on all your devices.
- Any edits you make</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
- tracking”</a>.</p>
-
- <p>There</em></ins></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
+ Any edits you make are automatically updated everywhere. [...]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>other ways to turn
off</em></ins></span> the
- <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>other kinds</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>send</em></ins></span>
the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
“please don't ask where.”</p>
<p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>,</strong></del></span> <span
class="inserted"><ins><em>location
- tracking,</em></ins></span> but <span class="removed"><del><strong>it's
active</strong></del></span> <span class="inserted"><ins><em>most users will be
tricked</em></ins></span> by <span class="removed"><del><strong>default so it
still counts as a
+ deactivate iCloud</a>, but it's active by
default</strong></del></span> <span class="inserted"><ins><em>machine's
“advertising ID,”</em></ins></span> so <span
class="removed"><del><strong>it still counts as a
surveillance functionality.</p>
<p>Unknown people apparently took advantage of this to
<a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them through
+ security to get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>that
+ Facebook</em></ins></span> can <span class="removed"><del><strong>access
any</strong></del></span> <span class="inserted"><ins><em>correlate the data it
obtains from the same machine via
+ various apps. Some</em></ins></span> of them <span
class="removed"><del><strong>through
<a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
- <li><p>Spyware in iThings:</strong></del></span> the <span
class="inserted"><ins><em>misleading control.</p>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>send Facebook detailed information about
+ the user's activities</em></ins></span> in <span
class="removed"><del><strong>iThings:</strong></del></span> the <span
class="removed"><del><strong><a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> <span class="inserted"><ins><em>app; others only
say that</em></ins></span> the <span class="removed"><del><strong>iThing is,
+ and get other info too.</p>
</li>
- <li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>iThing is,</strong></del></span>
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="removed"><del><strong>get other info too.</p>
+ <li><p>There is also a feature for web sites to track users,
which</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is
+ <span class="removed"><del><strong><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS
6,</strong></del></span>
+ <span class="inserted"><ins><em>using that app,</em></ins></span> but
<span class="removed"><del><strong>it
+ is still true in iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span> that <span class="removed"><del><strong>can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phones of users that have deleted
them</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps the NSA snoop</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>data in an
iThing,
+ or it is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem to exist for no
+ possible purpose other than surveillance</a>. Here is the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tracking software in popular Android apps is pervasive and
+ sometimes very clever. Some trackers can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a</strong></del></span> user's <span
class="removed"><del><strong>movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
+
+ <li><p>Android tracks</strong></del></span> location <span
class="removed"><del><strong>for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></strong></del></span>
even when <span class="inserted"><ins><em>users disable</em></ins></span>
“location <span
class="removed"><del><strong>services”</strong></del></span>
+ <span class="inserted"><ins><em>tracking”</a>.</p>
+
+ <p>There</em></ins></span> are <span
class="removed"><del><strong>turned off, even
+ when the phone has no SIM card</a>.</p></li>
+
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
+
+ <li><p>According to Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
+ by sending hidden text messages which enable them</strong></del></span>
<span class="inserted"><ins><em>other ways</em></ins></span> to turn <span
class="inserted"><ins><em>off</em></ins></span> the <span
class="removed"><del><strong>phones
+ on and off, listen to</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
+ tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>microphone, retrieve geo-location data
from</strong></del></span> <span class="inserted"><ins><em>misleading
control.</p>
</li>
- <li><p>There</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
+ <li id="M201806110">
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history,</strong></del></span> <span
class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware</strong></del></span>
<span class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>no way to save</em></ins></span>
- a <span class="removed"><del><strong>feature for web
sites</strong></del></span> <span class="inserted"><ins><em>recording. But I
can't be sure from the article.</p>
+ <p>I expect it implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ </li>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks</strong></del></span>
<span class="inserted"><ins><em>care much less</em></ins></span> about <span
class="removed"><del><strong>iOS 6, but it
- is still true</strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span
class="removed"><del><strong>iOS 7.)</p></strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one
more.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More than</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied</em></ins></span> by <span
class="removed"><del><strong>default, though that can be
- turned off.</p>
+ <li><p>Samsung phones come with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users</strong></del></span> <span class="inserted"><ins><em>save
+ a recording. But I</em></ins></span> can't <span
class="removed"><del><strong>delete</a>,
+ and they send so</strong></del></span> <span
class="inserted"><ins><em>be sure from the article.</p>
+
+ <p>If you learn to care</em></ins></span> much <span
class="removed"><del><strong>data that their transmission</strong></del></span>
<span class="inserted"><ins><em>less about sports, you will benefit in
+ many ways. This</em></ins></span> is <span class="removed"><del><strong>a
+ substantial expense for users. Said transmission, not wanted or
+ requested by the user, clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
</li>
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>researchers were found to snoop</em></ins></span>
- and <span class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
</li>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>NSA
snoop</strong></del></span> <span class="inserted"><ins><em>apps were
- found to insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>all the data</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>an iThing,
- or it</strong></del></span> <span class="inserted"><ins><em>these
proprietary apps whose
+ <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>5,855</em></ins></span> Android <span
class="removed"><del><strong>phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>apps studied</em></ins></span> by <span
class="removed"><del><strong>a paywall)
+ reports</strong></del></span> <span
class="inserted"><ins><em>researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
- <p>This</em></ins></span> is <span
class="removed"><del><strong>totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>evidence that proprietary apps generally work against
+ <p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
- need to get rid</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>the proprietary software—both proprietary
- Android by <a
href="https://replicant.us">switching</em></ins></span> to <span
class="removed"><del><strong>exist for no
- possible purpose</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains anti-features</a>.</p>
+ only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns</em></ins></span>
+ the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>user if an app
contains anti-features</a>.</p>
</li>
<li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
+ which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to
each</em></ins></span>
- other <span class="removed"><del><strong>than surveillance</a>.
Here is</strong></del></span> <span class="inserted"><ins><em>but not
to</em></ins></span> the <span class="inserted"><ins><em>server's
database.</p>
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service
- spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>dis-service
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Don't be tracked—pay cash!</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
-
-<ul>
- <li><p>Tracking</strong></del></span>
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking</em></ins></span> software in popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
-
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ <li id="M201711240">
+ <p>Tracking software</em></ins></span> in <span
class="inserted"><ins><em>popular</em></ins></span> Android
+ <span class="removed"><del><strong>phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>apps</em></ins></span>
+ is <span class="inserted"><ins><em>pervasive and sometimes very clever.
Some trackers can</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
+ networks</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google</strong></del></span>
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command and users cannot stop them:</strong></del></span>
<span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when the</strong></del></span>
+ <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all</em></ins></span> phone <span class="removed"><del><strong>has
no SIM card</a>.</p></li>
-
- <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data</strong></del></span> <span
class="inserted"><ins><em>numbers and email addresses</a> in user's
address
- book</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article misuses
the words
+ uploads</em></ins></span> all <span class="removed"><del><strong>new
portable phones</strong></del></span> <span class="inserted"><ins><em>phone
numbers and email addresses</a> in user's address
+ book</em></ins></span> to <span class="inserted"><ins><em>developer's
server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,
- <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a>
- by sending hidden</strong></del></span> <span
class="inserted"><ins><em>zero price.</p>
+ referring to zero price.</p>
</li>
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and</em></ins></span> text messages <span
class="removed"><del><strong>which enable them</strong></del></span> <span
class="inserted"><ins><em>and emails</em></ins></span> to <span
class="removed"><del><strong>turn the phones</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>and off, listen</strong></del></span>
<span class="inserted"><ins><em>the contrary, it
- worked in various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em>snooping of these apps.</p>
+ for the snooping of these apps.</p>
- <p>On</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history,</strong></del></span> <span
class="inserted"><ins><em>other hand, Google redistributes nonfree Android
apps,</em></ins></span> and <span
class="removed"><del><strong>read</strong></del></span>
- <span class="inserted"><ins><em>therefore shares in</em></ins></span> the
<span class="removed"><del><strong>contact list. This malware is designed to
- disguise itself from investigation.</p>
- </li>
-
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
- and they send so much data that their transmission is a
- substantial expense</strong></del></span> <span
class="inserted"><ins><em>responsibility</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
- requested by</strong></del></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>their being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way</em></ins></span> for <span
class="removed"><del><strong>voice all the time</a>.</p>
- </li>
-
- <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>Google, or</em></ins></span> Android <span
class="removed"><del><strong>phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate</strong></del></span> <span
class="inserted"><ins><em>users,
+ cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>source code for these apps,</em></ins></span> and
<span class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>study
- the source code somehow to determine whether they mistreat
users</em></ins></span> in <span class="removed"><del><strong>Android
- phones and laptops</a>.
- (I suspect</strong></del></span>
- <span class="inserted"><ins><em>various ways. If it did a good job of
this, it could more or less
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
@@ -1344,7 +1374,7 @@
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that</em></ins></span> this <span
class="removed"><del><strong>means Windows laptops.)
Here</strong></del></span> <span class="inserted"><ins><em>was done without the
users' consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
@@ -1370,8 +1400,8 @@
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece of
spyware</em></ins></span> is
- <span class="inserted"><ins><em>still spyware.</p>
+ remains spyware—an “optional” piece of spyware is
+ still spyware.</p>
</li>
<li id="M201701210">
@@ -1381,18 +1411,16 @@
</li>
<li id="M201611280">
- <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ <p>The Uber app tracks <a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p></em></ins></span>
+ massive surveillance.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160">
+ <li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -1402,21 +1430,17 @@
guarantees and abusive practices inflicted by VPN apps.”</p>
<p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and
infringe</em></ins></span> their <span class="removed"><del><strong>GPS
location on
- remote command</strong></del></span>
- <span class="inserted"><ins><em>privacy:</p>
+ of some proprietary VPN apps that track users and infringe their
+ privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX</em></ins></span>
and <span class="inserted"><ins><em>Appflood,
- meant to track</em></ins></span> users <span
class="removed"><del><strong>cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says</strong></del></span> <span class="inserted"><ins><em>and
show them targeted ads.</dd>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>has full access to
users'
+ permissions upon installation, meaning it has full access to users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
@@ -1430,7 +1454,7 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users. The stated purpose of the JS injection is</em></ins></span> to
<span class="inserted"><ins><em>display ads. Uses
+ users. The stated purpose of the JS injection is to display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
@@ -3107,7 +3131,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:49 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary-surveillance.de.po 7 Feb 2019 10:59:49 -0000 1.256
+++ proprietary-surveillance.de.po 8 Feb 2019 08:59:36 -0000 1.257
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1849,6 +1849,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.370
retrieving revision 1.371
diff -u -b -r1.370 -r1.371
--- proprietary-surveillance.fr.po 7 Feb 2019 13:27:55 -0000 1.370
+++ proprietary-surveillance.fr.po 8 Feb 2019 08:59:36 -0000 1.371
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2019-02-07 14:20+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1407,6 +1408,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary-surveillance.it-diff.html 7 Feb 2019 10:59:49 -0000
1.107
+++ proprietary-surveillance.it-diff.html 8 Feb 2019 08:59:36 -0000
1.108
@@ -1121,17 +1121,14 @@
twisted ways</strong></del></span> <span
class="inserted"><ins><em>illustrates</em></ins></span> that <span
class="removed"><del><strong>they present snooping as</strong></del></span>
<span class="inserted"><ins><em>making unauthorized copies of nonfree software
is not</em></ins></span> a <span class="removed"><del><strong>way
to “serve” users better</a>—never mind
- whether they want that. This is a typical example
of</strong></del></span> <span class="inserted"><ins><em>cure
for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
+ whether they want that. This is a typical example
of</strong></del></span> <span class="inserted"><ins><em>cure
for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying for</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>mobile
devices report which other
- apps</strong></del></span> the <span class="removed"><del><strong>user has
- installed.</strong></del></span> <span class="inserted"><ins><em>nasty
thing, but cannot make it less nasty.</p>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Many
proprietary</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1139,16 +1136,37 @@
</div>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN</em></ins></span> apps <span class="inserted"><ins><em>in
Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
+ apps</strong></del></span> <span class="inserted"><ins><em>invasive
advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>user has
+ installed.</strong></del></span> <span class="inserted"><ins><em>top 10
gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_</em></ins></span>
<a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ </li>
+
<li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The
company</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
<span class="inserted"><ins><em>being sued, demanding that it notify the
users of what it will do
with the data.</p>
<p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets</em></ins></span> that <span
class="inserted"><ins><em>data</em></ins></span> at <span
class="removed"><del><strong>least is visible</strong></del></span> <span
class="inserted"><ins><em>all.</p>
+ with the data is a secondary issue. The principal wrong here
is</em></ins></span> that
+ <span class="inserted"><ins><em>the company gets that
data</em></ins></span> at <span class="removed"><del><strong>least is
visible</strong></del></span> <span class="inserted"><ins><em>all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
@@ -1179,32 +1197,31 @@
<p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless</em></ins></span> of whether the
<span class="removed"><del><strong>app developers get
- users to say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>user
has a Facebook
- account.</p></em></ins></span>
+ <p>This spying occurs regardless</em></ins></span> of whether the
<span class="removed"><del><strong>app developers get</strong></del></span>
<span class="inserted"><ins><em>user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of</em></ins></span> users <span
class="removed"><del><strong>to say “I agree”. That is no excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>that have deleted
them</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies.</a></p>
<p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the <span class="removed"><del><strong>user to
- approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>phones of users that have deleted
them</a>.</p>
- </li>
-
- <li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>app
developer but did not
- ask about sending it to</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
tracking”</a>.</p>
- <p>There are</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>ways to turn off</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>other kinds</em></ins></span> of <span
class="inserted"><ins><em>location
+ <p>There are other ways</em></ins></span> to <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask about sending it to</strong></del></span> other <span
class="removed"><del><strong>companies. This shows the
+ weakness</strong></del></span> <span
class="inserted"><ins><em>kinds</em></ins></span> of <span
class="inserted"><ins><em>location
tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
“solution” to surveillance: why should a flashlight
app send any information to anyone? A free software flashlight
@@ -1232,143 +1249,105 @@
</li>
<li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"></strong></del></span>
<span class="inserted"><ins><em>act as</em></ins></span> spies for <span
class="removed"><del><strong>companies, and the NSA takes advantage to spy
through</strong></del></span> <span class="inserted"><ins><em>licensing
enforcement.</p>
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"></strong></del></span>
<span class="inserted"><ins><em>act as</em></ins></span> spies for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More</strong></del></span> <span class="inserted"><ins><em>care much
less</em></ins></span> about <span class="removed"><del><strong>NSA app
spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
<li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>implements
DRM, too—that there is no way</em></ins></span> to <span
class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
- a <span class="removed"><del><strong>speech recognition company based in
the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span>
the <span class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>article.</p>
-
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span class="removed"><del><strong>on a child's
speech, and even speak
- into the toys themselves.</p></strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one
more.</p></em></ins></span>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of the <span class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span class="inserted"><ins><em>5,855 Android
apps studied</em></ins></span> by <span class="removed"><del><strong>a person's
- body), as well as the vibration frequency.</p>
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span class="removed"><del><strong>U.S.</p>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked</strong></del></span> <span
class="inserted"><ins><em>researchers were found to snoop</em></ins></span>
- and <span class="removed"><del><strong>changed.</p>
-
- <p>The company that made the vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal</strong></del></span> <span
class="inserted"><ins><em>collect</em></ins></span> information about <span
class="removed"><del><strong>how
- people used it</a>.</p>
-
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a
- data broker, the data broker would have been able to figure out
- who the user was.</p>
-
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total</strong></del></span> <span
class="inserted"><ins><em>its users</a>. 40%</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>the apps were
- found</em></ins></span> to <span class="inserted"><ins><em>insecurely
snitch on</em></ins></span> its <span
class="removed"><del><strong>customers.</p>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control the toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech,</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>even speak
+ into</strong></del></span> <span class="inserted"><ins><em>collect
information about its users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p>
</li>
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+ <li>
+ <p>A computerized vibrator
+ <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span> <span class="inserted"><ins><em>apps
were
+ found to insecurely snitch</em></ins></span> on its <span
class="removed"><del><strong>users through the</strong></del></span> <span
class="inserted"><ins><em>users. Furthermore, they could
+ detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>control app</a>.</p>
+
+ <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to <span class="inserted"><ins><em>get rid
of</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>data</a>
- collected</strong></del></span> <span
class="inserted"><ins><em>proprietary apps</em></ins></span> by <span
class="inserted"><ins><em>getting apps from</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>free
software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>manufacturer
and</strong></del></span> <span class="inserted"><ins><em>user if an app
contains anti-features</a>.</p>
+ need to get rid</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android</em></ins></span> by <span class="removed"><del><strong>a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em><a href="https://replicant.us">switching to
Replicant</a>,
+ and</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than</strong></del></span> free software <span
class="removed"><del><strong>which users could have
+ checked and changed.</p>
+
+ <p>The company</strong></del></span>
+ <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a></em></ins></span> that
<span class="removed"><del><strong>made the vibrator</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
<li id="M201804020">
- <p>Grindr collects information about <a
+ <p>Grindr collects</em></ins></span> information about <span
class="removed"><del><strong>how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>information to
+ which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>data may</strong></del></span> <span
class="inserted"><ins><em>information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It</em></ins></span> could <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>be designed so that users communicate such
info</em></ins></span> to <span class="removed"><del><strong>these conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>each
- other but not</em></ins></span> to <span class="inserted"><ins><em>the
server's database.</p>
+ It could</em></ins></span> be
+ <span class="removed"><del><strong>true,</strong></del></span> <span
class="inserted"><ins><em>designed so that users communicate such info to each
+ other</em></ins></span> but <span class="removed"><del><strong>it doesn't
really matter. If it had sold</strong></del></span> <span
class="inserted"><ins><em>not to</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>children</strong></del></span>
<span class="inserted"><ins><em>users even more than users expected. It <a
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>after going</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
+ where they travel before and after going</em></ins></span> to a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
@@ -1376,131 +1355,149 @@
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo
used</strong></del></span> <span class="inserted"><ins><em>words
+ uploads all phone numbers and email addresses</a> in user's address
+ book</em></ins></span> to <span class="removed"><del><strong>figure out
+ who the user was.</p>
+
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that</em></ins></span> this
<span class="removed"><del><strong>lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>article misuses</em></ins></span> the <span
class="removed"><del><strong>company has been ordered to pay a total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ referring</em></ins></span> to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span class="inserted"><ins><em>zero
price.</p></em></ins></span>
</li>
- <li id="M201707270">
- <p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
-
- <p>Google</em></ins></span> did not <span
class="removed"><del><strong>affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>intend</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ <span class="inserted"><ins><em><li id="M201707270">
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Google did not intend</em></ins></span> to <span
class="inserted"><ins><em>make these apps spy; on</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>contrary, it
+ worked in various ways to prevent that, and deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
- </li>
-</ul>
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+ <p>Could Google have done</em></ins></span> a <span
class="inserted"><ins><em>better job of preventing apps from
+ cheating? There is no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
+ to <span class="removed"><del><strong>access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
+
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>source code for these apps,</em></ins></span> and
<span class="inserted"><ins><em>study</em></ins></span>
+ the <span class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>source code somehow to determine whether they
mistreat users in
+ various ways. If it did a good job of this, it</em></ins></span> could
<span class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>more or less
+ prevent such snooping, except when the app developers are clever
+ enough</em></ins></span> to <span class="removed"><del><strong>these
conversations
+ was unacceptable by itself.</p></li>
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>outsmart the
checking.</p>
-<ul>
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"></strong></del></span>
<span class="inserted"><ins><em>various ways to prevent that, and deleted
these apps after
- discovering what they did. So we cannot blame Google</em></ins></span>
specifically
- for <span class="removed"><del><strong>spying</a>.</p>
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p>
</li>
</ul>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>the
+ public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> each <span
class="removed"><del><strong>subsection -->
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the snooping of these apps.</p>
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
-
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+<ul>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
+Note</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>the
specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging by <a
-
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>demands to personal data in</em></ins></span> the
<span class="removed"><del><strong>emails of members</strong></del></span>
<span class="inserted"><ins><em>device</a>.</p>
</li>
<li id="M201704190">
<p>Users are suing Bose for <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
+ the app would record the names</em></ins></span> of <span
class="removed"><del><strong>Parliament</strong></del></span> <span
class="inserted"><ins><em>the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that this was done without the users' consent.
+ <p>The suit accuses that</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>was done without the users' consent.
If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ would that make</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201704074">
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074">
<p>Pairs of Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
@@ -1891,7 +1888,12 @@
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
+ surveillance, even if it were not hidden as it was</em></ins></span> in
<span class="removed"><del><strong>Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>these TVs,
does not legitimize the surveillance.</p>
</li>
@@ -1956,21 +1958,30 @@
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
- software in your own computer.</p>
+ software</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p>
+ <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201409290">
+ <span class="inserted"><ins><em><li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
@@ -2942,7 +2953,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:49 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- proprietary-surveillance.it.po 7 Feb 2019 10:59:49 -0000 1.269
+++ proprietary-surveillance.it.po 8 Feb 2019 08:59:36 -0000 1.270
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -83,12 +83,23 @@
msgstr ""
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <div><div><a>
msgid "<a href=\"/graphics/dog.html\">"
@@ -1788,6 +1799,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-surveillance.ja-diff.html 7 Feb 2019 10:59:49 -0000
1.117
+++ proprietary-surveillance.ja-diff.html 8 Feb 2019 08:59:36 -0000
1.118
@@ -1020,17 +1020,15 @@
twisted ways</strong></del></span> <span
class="inserted"><ins><em>illustrates</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a way
to “serve” users better</a>—never mind
whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
- is <span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>cure for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
+ is <span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>cure for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying for</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>mobile
devices report which other
- apps</strong></del></span> the <span class="removed"><del><strong>user has
- installed.</strong></del></span> <span class="inserted"><ins><em>nasty
thing, but cannot make it less nasty.</p>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
+ apps</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1038,75 +1036,80 @@
</div>
<ul class="blurbs">
- <li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ <li id="M201902010">
+ <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed.</strong></del></span> <span class="inserted"><ins><em>150 most
popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="inserted"><ins><em>their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover,</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>previous investigation had found</em></ins></span>
that <span class="removed"><del><strong>at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile</strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>have lousy
privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901050">
+ <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The
company</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding that it notify the
users of what it will do
- with the data.</p>
-
- <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets</em></ins></span> that <span
class="inserted"><ins><em>data</em></ins></span> at <span
class="removed"><del><strong>least is visible</strong></del></span> <span
class="inserted"><ins><em>all.</p>
+ stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>users of what it will
do
+ with</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about a side issue.
What</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>question of
whether the app developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>a
secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p></strong></del></span> <span
class="inserted"><ins><em>WeatherBug, are
+ Other weather apps</a>, including Accuweather and WeatherBug, are
tracking people's locations.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
<span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
- </li>
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <li><p>Widely used</strong></del></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
+ <p>The FTC criticized this app because it
asked</strong></del></span>
<span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
+ report on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's actions</em></ins></span> to
+ <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
- Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>data it obtains
from</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in the
- <span class="removed"><del><strong>phone.</p>
-
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>user is
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>it obtains from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask</strong></del></span> <span class="inserted"><ins><em>same machine
via
+ various apps. Some of them send Facebook detailed
information</em></ins></span> about <span class="removed"><del><strong>sending
it to other companies. This shows</strong></del></span>
+ the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's activities in the app; others only say that
the user is
using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless</em></ins></span> of whether the
<span class="removed"><del><strong>app developers get</strong></del></span>
<span class="inserted"><ins><em>user has a Facebook
- account.</p>
- </li>
-
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of</em></ins></span> users <span
class="removed"><del><strong>to say “I agree”. That is no excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>that have deleted
them</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
- tracking”</a>.</p>
-
- <p>There are other ways</em></ins></span> to <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask about sending it to</strong></del></span> other <span
class="removed"><del><strong>companies. This shows the
- weakness</strong></del></span> <span
class="inserted"><ins><em>kinds</em></ins></span> of <span
class="inserted"><ins><em>location
- tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
+ <p>This spying occurs regardless</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>user has</em></ins></span> a <span
class="removed"><del><strong>flashlight
app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>misleading control.</p></em></ins></span>
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
+ account.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1119,18 +1122,31 @@
<ul>
<li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>listens through the
microphone</a>.</p>
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
+ <li id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends personal data
about them</strong></del></span> <span class="inserted"><ins><em>disable
“location
+ tracking”</a>.</p>
- <p>This makes</em></ins></span> them <span
class="removed"><del><strong>to
- nVidia servers</a>.</p>
+ <p>There are other ways</em></ins></span> to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"></strong></del></span>
<span class="inserted"><ins><em>act as</em></ins></span> spies for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
+
+ <p>This makes them act as</em></ins></span> spies for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
<p>I expect it implements DRM, too—that there is no way to save
a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>article.</p>
@@ -1164,60 +1180,61 @@
and collect</em></ins></span> information about <span
class="removed"><del><strong>how
people use it</a>.</p>
- <p>The company's statement that it
anonymizes</strong></del></span> <span class="inserted"><ins><em>its
users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If it sells the
data</strong></del></span> <span class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="removed"><del><strong>a
- data broker, the data broker can figure out who the user is.</p>
- </li>
-
- <li><p>A computerized
- vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
<span class="inserted"><ins><em>insecurely snitch</em></ins></span> on its
<span class="removed"><del><strong>users through the</strong></del></span>
<span class="inserted"><ins><em>users. Furthermore, they could
- detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>control app</a>.</p>
-
- <p>The app reports the temperature</strong></del></span> <span
class="inserted"><ins><em>apps whose
- source code they cannot look at. The other apps might be snooping
+ <p>The company's statement that it
anonymizes</strong></del></span> <span class="inserted"><ins><em>its
users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>data may</strong></del></span> <span
class="inserted"><ins><em>apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might</em></ins></span> be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If it sells</strong></del></span> <span class="inserted"><ins><em>snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
- need to get rid</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it is surrounded</strong></del></span>
<span class="inserted"><ins><em>proprietary software—both proprietary
- Android</em></ins></span> by <span class="removed"><del><strong>a person's
- body),</strong></del></span> <span class="inserted"><ins><em><a
href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and the <span class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> free software <span
class="removed"><del><strong>which users can check
- and change.</p></strong></del></span>
- <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a> that <a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains
anti-features</a>.</p></em></ins></span>
+ need to get rid of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both proprietary
+ Android by <a
href="https://replicant.us">switching</em></ins></span> to <span
class="removed"><del><strong>a
+ data broker,</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
+ and</em></ins></span> the <span class="removed"><del><strong>data broker
can figure out who</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps from the free
software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the user <span
class="removed"><del><strong>is.</p></strong></del></span> <span
class="inserted"><ins><em>if an app contains
anti-features</a>.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+
+ <span class="removed"><del><strong><li><p>A computerized
+ vibrator</strong></del></span>
<span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much information about its users.
- It could be designed so that users communicate such info to each
- other but not</em></ins></span> to <span class="inserted"><ins><em>the
server's database.</p>
+ <p>Grindr should not have so much information
about</em></ins></span> its <span class="inserted"><ins><em>users.
+ It could be designed so that</em></ins></span> users <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>communicate such info to each
+ other but not to</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
</li>
- <li id="M201803050">
- <p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>children</strong></del></span>
<span class="inserted"><ins><em>users even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p>
+ <li id="M201803050"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>moviepass</em></ins></span>
app <span class="removed"><del><strong>reports the temperature of the vibrator
minute by
+ minute (thus, indirectly, whether it is surrounded by a person's
+ body),</strong></del></span> and <span class="removed"><del><strong>the
vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather</strong></del></span> <span
class="inserted"><ins><em>dis-service
+ spy on users even more</em></ins></span> than <span
class="removed"><del><strong>free software which</strong></del></span> users
<span class="removed"><del><strong>can check
+ and change.</p>
+ </li>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after</em></ins></span> going to <span
class="removed"><del><strong>spy on children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>after going</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1227,12 +1244,9 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span>
- <p>Don't be tracked—pay cash!</p>
- </li>
-
- <li id="M201711240">
+ <span class="inserted"><ins><em><li id="M201711240">
<p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
@@ -1250,7 +1264,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses the words
+ book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo
used</strong></del></span> <span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -1260,13 +1274,80 @@
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ <p>Google</em></ins></span> did not <span
class="removed"><del><strong>affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>intend</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span>
+ <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"></strong></del></span>
<span class="inserted"><ins><em>various ways to prevent that, and deleted
these apps after
+ discovering what they did. So we cannot blame Google</em></ins></span>
specifically
+ for <span class="removed"><del><strong>spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ therefore shares</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>responsibility for</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
@@ -1277,77 +1358,148 @@
<p>Google could demand the source code for these apps, and study
the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
+ various ways. If</em></ins></span> it <span class="inserted"><ins><em>did
a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
+ enough</em></ins></span> to outsmart
+ <span class="removed"><del><strong>you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this</strong></del></span> <span class="inserted"><ins><em>the
checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ Google to protect us. We must demand release of source</em></ins></span>
code <span class="removed"><del><strong>snoops</strong></del></span> <span
class="inserted"><ins><em>to the
+ public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>each other.</p></em></ins></span>
</li>
- <li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
+ Kindle:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
- don't snoop.</p>
+ <p>With free software apps, users could <em>make
sure</em> that</em></ins></span> they <span
class="removed"><del><strong>report even which page the user reads at what
time</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
</li>
- <li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040">
+ <p>A study found 234 Android apps that track users</em></ins></span>
by <span class="removed"><del><strong>most US libraries,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging by <a
+ <p>Faceapp appears to do</em></ins></span> lots of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>surveillance, judging by <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.</p>
+ how much access it demands</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware</strong></del></span> <span
class="inserted"><ins><em>personal data</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>the
device</a>.</p>
</li>
<li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
- along with the headphone's unique serial number.</p>
-
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
- </li>
-
- <li id="M201704074">
- <p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
+ <p>Users</em></ins></span> are <span class="inserted"><ins><em>suing
Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access</strong></del></span> <span class="inserted"><ins><em>spyware app
for</em></ins></span> its <span class="removed"><del><strong>computers remotely
and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span class="inserted"><ins><em>app
would record</em></ins></span> the <span class="removed"><del><strong>modem.
However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in</strong></del></span> <span
class="inserted"><ins><em>names of</em></ins></span> the <span
class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>audio files users listen</em></ins></span> to
+ <span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without</em></ins></span> the
<span class="removed"><del><strong>phone company to track</strong></del></span>
<span class="inserted"><ins><em>users' consent.
+ If</em></ins></span> the <span class="removed"><del><strong>car's
movements all</strong></del></span> <span class="inserted"><ins><em>fine print
of</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>app said that users gave consent for this,
+ would that make</em></ins></span> it <span class="removed"><del><strong>is
possible</strong></del></span> <span class="inserted"><ins><em>acceptable? No
way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
+ the <span class="removed"><del><strong>cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>app to snoop at
all</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074">
+ <p>Pairs of Android apps can collude</em></ins></span>
+ to <span class="removed"><del><strong>car manufacturers, insurance
companies, and
+ others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens of thousands of pairs that collude</a>.</p>
+ study found tens</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article, is not
+ really a matter</strong></del></span> <span
class="inserted"><ins><em>thousands</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> <span class="inserted"><ins><em>pairs that
collude</a>.</p>
</li>
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
+ announced</em></ins></span> an
+ <span class="removed"><del><strong>intolerable
invasion</strong></del></span> <span class="inserted"><ins><em>opt-in
proprietary search app that it will</a> pre-install
+ on some</em></ins></span> of <span class="removed"><del><strong>privacy,
and should be replaced with anonymous
+ payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>its
phones.</em></ins></span> The <span class="removed"><del><strong>other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>same information
+ about</em></ins></span> the <span class="removed"><del><strong>company to
extract data remotely and
+ determine</strong></del></span> <span class="inserted"><ins><em>users'
searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app takes effect. However, the app
+ <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>app
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</em></ins></span> and
<span class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>user must
+ explicitly opt-in before</em></ins></span> the <span
class="removed"><del><strong>data
+ and hand it over,</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the
<span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>app
remains spyware—an “optional” piece of spyware is
- still spyware.</p>
+ still spyware.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
- <li id="M201701210">
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to a Chinese company</a>.</p>
@@ -1702,7 +1854,7 @@
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>article for the
facts it presents. It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
@@ -1767,10 +1919,9 @@
<li id="M201504300">
<p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"></em></ins></span>
- used <span class="inserted"><ins><em>a firmware “upgrade” to
make its TVs snoop on what
- users watch</a>. The TVs</em></ins></span> did not <span
class="removed"><del><strong>affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>do that when first sold.</p>
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
<li id="M201502090">
@@ -1780,19 +1931,12 @@
Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition</em></ins></span> is not <span
class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>to be trusted
unless it is done by free
- software</em></ins></span> in <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>your</em></ins></span> own <span
class="removed"><del><strong>malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>computer.</p>
+ <p>Speech recognition is not to be trusted unless it is done by free
+ software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>third
+ data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
@@ -1804,18 +1948,8 @@
<li id="M201409290">
<p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>their
users</a>.</p>
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
<p>The report was as of 2014, but we don't expect this has got
better.</p>
@@ -1831,29 +1965,21 @@
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
-
- <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ snoops on other devices on the user's local network</a>.</p>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+ <p>LG later said it had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs <a
+
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
@@ -1861,62 +1987,35 @@
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching
TV.</p></em></ins></span>
+ and use its camera to watch the people who are watching TV.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a> which save it
permanently.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
manufacturers promise not to look at what's in the videos. That's not
- security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
+ security for your home. Security means making</em></ins></span> sure <span
class="inserted"><ins><em>they don't get to
+ see through your camera.</p>
</li>
<li id="M201603220">
@@ -1925,204 +2024,139 @@
security bugs that allow anyone to watch through them</a>.</p>
</li>
- <li id="M201511250"></em></ins></span>
+ <li id="M201511250">
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using
<span class="removed"><del><strong>it to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span>
- to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInToys">Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because the system has no authentication when
- accessed through</strong></del></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>code could surely convert</em></ins></span> it
<span class="removed"><del><strong>asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span>
- <span class="inserted"><ins><em>into one.</p>
+ listening device, remote changes to the code could surely convert it
+ into one.</p>
</li>
<li id="M201711100">
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span class="removed"><del><strong>car
is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
+ recordings of the conversation between two users</a>.</p>
</li>
<li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</em></ins></span> its <span
class="removed"><del><strong>users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>users
through</em></ins></span> the <span class="removed"><del><strong>phone company
to track</strong></del></span> <span class="inserted"><ins><em>proprietary
control app</a>.</p>
-
- <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>temperature of</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>was surrounded by
a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
- though.</p>
- </li>
-
- <li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span> <span class="inserted"><ins><em>vibration
frequency.</p>
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>drivers'
movements</a>,</strong></del></span> <span class="inserted"><ins><em>their
- products, rather than free software</em></ins></span> which <span
class="removed"><del><strong>is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>users could
have checked</em></ins></span>
- and
- <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p></em></ins></span>
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
- <p>The <span class="removed"><del><strong>case</strong></del></span>
<span class="inserted"><ins><em>company that made the vibrator <a
+ <p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned
in</strong></del></span> <span class="inserted"><ins><em>personal information
about how people
+ was sued for collecting lots of personal information about how people
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
+ true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>a data
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following</em></ins></span> this <span
class="removed"><del><strong>article, is not
- really</strong></del></span> <span class="inserted"><ins><em>lawsuit,
<a
+ <p>Following this lawsuit, <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>total</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m</a>
to its
+ the company has been ordered to pay a total of C$4m</a> to its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>microphones <a
+ <p>“CloudPets” toys with microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a>
collected</em></ins></span> by <span class="removed"><del><strong>proprietary
malware in</strong></del></span> the <span
class="removed"><del><strong>car.</p></li>
+ Crackers found a way to access the data</a> collected by the
+ manufacturer's snooping.</p>
- <li><p>Tesla cars allow</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
-
- <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ <p>That the manufacturer and the FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
- company <span class="removed"><del><strong>says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
+ can remotely control the toys with a mobile phone. This would enable
+ crackers to listen in</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>a child's speech, and even speak into the
+ toys themselves.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201502180">
+ <li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in
many cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ on you</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201808120">
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>break the security of
an Amazon device,
+ <p>Crackers found a way to break the security of an Amazon device,
and</em></ins></span> <a <span class="removed"><del><strong>href="
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
@@ -2747,7 +2781,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:49 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- proprietary-surveillance.ja.po 7 Feb 2019 10:59:49 -0000 1.242
+++ proprietary-surveillance.ja.po 8 Feb 2019 08:59:36 -0000 1.243
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1492,6 +1492,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary-surveillance.pot 7 Feb 2019 10:59:49 -0000 1.190
+++ proprietary-surveillance.pot 8 Feb 2019 08:59:36 -0000 1.191
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -997,6 +997,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\"> 25% fail "
+"to protect their usersâ privacy</a> due to DNS leaks. In addition, 85% "
+"feature intrusive permissions or functions in their source code—often "
+"used for invasive advertising—that could potentially also be used to "
+"spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-app-investigation/\">half of the "
+"top 10 gratis VPN apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a "
+"href=\"/philosophy/free-sw.html\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a "
"href=\"https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\">
"
"stored users' locations to the company's server</a>. The company is being "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.463
retrieving revision 1.464
diff -u -b -r1.463 -r1.464
--- proprietary-surveillance.ru.po 7 Feb 2019 13:30:31 -0000 1.463
+++ proprietary-surveillance.ru.po 8 Feb 2019 08:59:36 -0000 1.464
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1394,6 +1395,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-tyrants.it.po 5 Jan 2019 11:31:36 -0000 1.39
+++ proprietary-tyrants.it.po 8 Feb 2019 08:59:36 -0000 1.40
@@ -64,12 +64,23 @@
"approvate”. Chiamiamo questa pratica <em>tivoizzazione</em>."
#. type: Content of: <div><div><p>
+# || No change detected. The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden"><address@hidden"
+#| "org></a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
"or two to serve as specific substantiation."
msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden"><"
+"address@hidden></a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary.de-diff.html 7 Feb 2019 10:59:50 -0000 1.42
+++ proprietary.de-diff.html 8 Feb 2019 08:59:36 -0000 1.43
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -123,9 +123,9 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -183,6 +183,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201902040">
<p>Google invites people to <a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
@@ -232,21 +251,6 @@
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <li id="M201901110">
- <p>Samsung phones come preloaded with <a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
- a version of the Facebook app that can't be deleted</a>. <a
-
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app">
- Facebook claims this is a stub</a> which doesn't do anything, but we
- have to take their word for it, and there is the permanent risk that
- the app will be activated by an automatic update.</p>
-
- <p>Preloading crapware along with a nonfree operating system is
common
- practice, but by making the crapware undeletable, Facebook and Samsung
(<a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
- are going one step further in their hijacking of users' devices.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary.de.po 7 Feb 2019 10:59:50 -0000 1.84
+++ proprietary.de.po 8 Feb 2019 08:59:36 -0000 1.85
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -497,26 +521,6 @@
"nasty thing, but cannot make it less nasty."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary.es.po 7 Feb 2019 11:31:42 -0000 1.93
+++ proprietary.es.po 8 Feb 2019 08:59:36 -0000 1.94
@@ -8,13 +8,13 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2019-02-07 11:37+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
"Language: es\n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"X-Outdated-Since: 2019-02-07 10:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -299,6 +299,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -393,39 +417,6 @@
"es un remedio contra la injusticia de ese tipo de software. Puede evitar que "
"se pague por algo malo, pero no lo hace menos malo."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-"Los teléfonos Samsung llevan preinstalada <a href=\"https://www.bloomberg."
-"com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
-"delete-facebook\">una versión de la aplicación de Facebook que no puede "
-"eliminarse</a>. <a href=\"https://www.infopackets.com/news/10484/truth-"
-"behind-undeletable-facebook-app\">Facebook afirma que eso es un residuo</a> "
-"que no hace nada, pero tenemos que creerles, y existe un riesgo permanente "
-"de que la aplicación se active mediante una actualización automática."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-"La preinstalación de programas basura es una práctica común en los
sistemas "
-"operativos que no son libres, pero al hacer que esos programas no puedan "
-"eliminarse, Facebook and Samsung (<a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\">among others</a>) están dando un paso más en su secuestro de los
"
-"dispositivos de los usuarios."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,6 +496,38 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/"
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
+#~ "a>. <a href=\"https://www.infopackets.com/news/10484/truth-behind-"
+#~ "undeletable-facebook-app\"> Facebook claims this is a stub</a> which "
+#~ "doesn't do anything, but we have to take their word for it, and there is "
+#~ "the permanent risk that the app will be activated by an automatic update."
+#~ msgstr ""
+#~ "Los teléfonos Samsung llevan preinstalada <a
href=\"https://www.bloomberg."
+#~ "com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\">una versión de la aplicación de Facebook que no puede "
+#~ "eliminarse</a>. <a href=\"https://www.infopackets.com/news/10484/truth-"
+#~ "behind-undeletable-facebook-app\">Facebook afirma que eso es un residuo</"
+#~ "a> que no hace nada, pero tenemos que creerles, y existe un riesgo "
+#~ "permanente de que la aplicación se active mediante una actualización "
+#~ "automática."
+
+#~ msgid ""
+#~ "Preloading crapware along with a nonfree operating system is common "
+#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
+#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-"
+#~ "phone-users-get-a-shock-they-can-t-delete-facebook\">among others</a>) "
+#~ "are going one step further in their hijacking of users' devices."
+#~ msgstr ""
+#~ "La preinstalación de programas basura es una práctica común en los "
+#~ "sistemas operativos que no son libres, pero al hacer que esos programas "
+#~ "no puedan eliminarse, Facebook and Samsung (<a href=\"https://www."
+#~ "bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-"
+#~ "they-can-t-delete-facebook\">among others</a>) están dando un paso más
en "
+#~ "su secuestro de los dispositivos de los usuarios."
+
+#~ msgid ""
#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary.fr.po 7 Feb 2019 13:27:55 -0000 1.116
+++ proprietary.fr.po 8 Feb 2019 08:59:36 -0000 1.117
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2019-02-07 14:20+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -396,39 +421,6 @@
"remède contre l'injustice qu'ils représentent. Elle permet ne pas payer
pour "
"ces choses malfaisantes, mais ne peut pas les rendre moins malfaisantes."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-"Les téléphone Samsung sont livrés avec <a
href=\"https://www.bloomberg.com/"
-"news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\">une version de l'appli Facebook qu'on ne peut pas supprimer</a>. "
-"<a href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-"
-"facebook-app\">Facebook prétend qu'il s'agit d'une coquille vide</a>, non "
-"fonctionnelle, mais on doit les croire sur parole et il y a toujours un "
-"risque que l'appli soit activée par une mise à jour automatique."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-"La préinstallation de pourriciels avec un système d'exploitation non libre "
-"est pratique courante, mais en rendant impossible la suppression du "
-"pouriciel, Facebook et Samsung (<a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\">parmi d'autres</a>) vont encore plus loin dans le piratage des "
-"appareils des utilisateurs."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -502,3 +494,35 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/"
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
+#~ "a>. <a href=\"https://www.infopackets.com/news/10484/truth-behind-"
+#~ "undeletable-facebook-app\"> Facebook claims this is a stub</a> which "
+#~ "doesn't do anything, but we have to take their word for it, and there is "
+#~ "the permanent risk that the app will be activated by an automatic update."
+#~ msgstr ""
+#~ "Les téléphone Samsung sont livrés avec <a href=\"https://www.bloomberg."
+#~ "com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\">une version de l'appli Facebook qu'on ne peut pas "
+#~ "supprimer</a>. <a href=\"https://www.infopackets.com/news/10484/truth-"
+#~ "behind-undeletable-facebook-app\">Facebook prétend qu'il s'agit d'une "
+#~ "coquille vide</a>, non fonctionnelle, mais on doit les croire sur parole "
+#~ "et il y a toujours un risque que l'appli soit activée par une mise Ã
jour "
+#~ "automatique."
+
+#~ msgid ""
+#~ "Preloading crapware along with a nonfree operating system is common "
+#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
+#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-"
+#~ "phone-users-get-a-shock-they-can-t-delete-facebook\">among others</a>) "
+#~ "are going one step further in their hijacking of users' devices."
+#~ msgstr ""
+#~ "La préinstallation de pourriciels avec un système d'exploitation non "
+#~ "libre est pratique courante, mais en rendant impossible la suppression du "
+#~ "pouriciel, Facebook et Samsung (<a href=\"https://www.bloomberg.com/news/"
+#~ "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+#~ "facebook\">parmi d'autres</a>) vont encore plus loin dans le piratage des "
+#~ "appareils des utilisateurs."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary.it-diff.html 7 Feb 2019 10:59:50 -0000 1.54
+++ proprietary.it-diff.html 8 Feb 2019 08:59:36 -0000 1.55
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -99,18 +99,18 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -182,6 +182,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201902040">
<p>Google invites people to <a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
@@ -231,21 +250,6 @@
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <li id="M201901110">
- <p>Samsung phones come preloaded with <a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
- a version of the Facebook app that can't be deleted</a>. <a
-
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app">
- Facebook claims this is a stub</a> which doesn't do anything, but we
- have to take their word for it, and there is the permanent risk that
- the app will be activated by an automatic update.</p>
-
- <p>Preloading crapware along with a nonfree operating system is
common
- practice, but by making the crapware undeletable, Facebook and Samsung
(<a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
- are going one step further in their hijacking of users' devices.</p>
- </li>
</ul></em></ins></span>
@@ -306,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary.it.po 7 Feb 2019 10:59:50 -0000 1.93
+++ proprietary.it.po 8 Feb 2019 08:59:36 -0000 1.94
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -501,26 +525,6 @@
"nasty thing, but cannot make it less nasty."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.ja-diff.html 7 Feb 2019 10:59:50 -0000 1.55
+++ proprietary.ja-diff.html 8 Feb 2019 08:59:36 -0000 1.56
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -95,16 +95,16 @@
</tr>
<tr>
<td>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <ul>
+ <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
- <li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
<li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
<li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -155,10 +155,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -179,6 +179,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201902040">
<p>Google invites people to <a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
@@ -228,21 +247,6 @@
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <li id="M201901110">
- <p>Samsung phones come preloaded with <a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
- a version of the Facebook app that can't be deleted</a>. <a
-
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app">
- Facebook claims this is a stub</a> which doesn't do anything, but we
- have to take their word for it, and there is the permanent risk that
- the app will be activated by an automatic update.</p>
-
- <p>Preloading crapware along with a nonfree operating system is
common
- practice, but by making the crapware undeletable, Facebook and Samsung
(<a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
- are going one step further in their hijacking of users' devices.</p>
- </li>
</ul></em></ins></span>
@@ -303,7 +307,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.ja.po 7 Feb 2019 10:59:50 -0000 1.76
+++ proprietary.ja.po 8 Feb 2019 08:59:36 -0000 1.77
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -421,26 +445,6 @@
"nasty thing, but cannot make it less nasty."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary.nl-diff.html 7 Feb 2019 10:59:50 -0000 1.54
+++ proprietary.nl-diff.html 8 Feb 2019 08:59:36 -0000 1.55
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -99,19 +99,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
@@ -182,6 +182,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201902040">
<p>Google invites people to <a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
@@ -231,21 +250,6 @@
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <li id="M201901110">
- <p>Samsung phones come preloaded with <a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
- a version of the Facebook app that can't be deleted</a>. <a
-
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app">
- Facebook claims this is a stub</a> which doesn't do anything, but we
- have to take their word for it, and there is the permanent risk that
- the app will be activated by an automatic update.</p>
-
- <p>Preloading crapware along with a nonfree operating system is
common
- practice, but by making the crapware undeletable, Facebook and Samsung
(<a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
- are going one step further in their hijacking of users' devices.</p>
- </li>
</ul></em></ins></span>
@@ -306,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.nl.po 7 Feb 2019 10:59:50 -0000 1.65
+++ proprietary.nl.po 8 Feb 2019 08:59:36 -0000 1.66
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -494,26 +518,6 @@
"nasty thing, but cannot make it less nasty."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.pl-diff.html 7 Feb 2019 10:59:50 -0000 1.72
+++ proprietary.pl-diff.html 8 Feb 2019 08:59:36 -0000 1.73
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -87,8 +87,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
+instances of malicious functionalities (with more than 400 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -124,10 +124,10 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -180,6 +180,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201902040">
<p>Google invites people to <a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
@@ -229,21 +248,6 @@
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <li id="M201901110">
- <p>Samsung phones come preloaded with <a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
- a version of the Facebook app that can't be deleted</a>. <a
-
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app">
- Facebook claims this is a stub</a> which doesn't do anything, but we
- have to take their word for it, and there is the permanent risk that
- the app will be activated by an automatic update.</p>
-
- <p>Preloading crapware along with a nonfree operating system is
common
- practice, but by making the crapware undeletable, Facebook and Samsung
(<a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
- are going one step further in their hijacking of users' devices.</p>
- </li>
</ul></em></ins></span>
@@ -304,7 +308,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary.pl.po 7 Feb 2019 10:59:50 -0000 1.60
+++ proprietary.pl.po 8 Feb 2019 08:59:37 -0000 1.61
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -576,26 +600,6 @@
"nasty thing, but cannot make it less nasty."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary.pot 7 Feb 2019 10:59:50 -0000 1.57
+++ proprietary.pot 8 Feb 2019 08:59:37 -0000 1.58
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -245,6 +245,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\"> 25% fail "
+"to protect their usersâ privacy</a> due to DNS leaks. In addition, 85% "
+"feature intrusive permissions or functions in their source code—often "
+"used for invasive advertising—that could potentially also be used to "
+"spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-app-investigation/\">half of the "
+"top 10 gratis VPN apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a "
+"href=\"/philosophy/free-sw.html\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a "
"href=\"https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss\">
"
"let Google monitor their phone use, and all internet use in their homes, for "
@@ -310,26 +335,6 @@
"nasty thing, but cannot make it less nasty."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">
"
-"a version of the Facebook app that can't be deleted</a>. <a "
-"href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app\">
"
-"Facebook claims this is a stub</a> which doesn't do anything, but we have to "
-"take their word for it, and there is the permanent risk that the app will be "
-"activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">among
"
-"others</a>) are going one step further in their hijacking of users' "
-"devices."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.pt-br.po 7 Feb 2019 10:59:50 -0000 1.76
+++ proprietary.pt-br.po 8 Feb 2019 08:59:37 -0000 1.77
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2019-02-03 22:30-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -386,39 +410,6 @@
"cura para a injustiça do software não livre. Pode evitar pagar pelo "
"desagradável, mas não pode torná-lo menos desagradável."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-"Os telefones Samsung vêm pré-carregados com <a
href=\"https://www.bloomberg."
-"com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
-"delete-facebook\"> uma versão do aplicativo do Facebook que não pode ser "
-"excluÃda </a>. <a
href=\"https://www.infopackets.com/news/10484/truth-behind-"
-"undeletable-facebook-app\"> O Facebook alega que este é um esboço</a> que "
-"não faz nada, mas nós temos que aceitar a palavra deles nisso, e há o
risco "
-"permanente de que o aplicativo será ativado por uma atualização
automática."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-"Pré-carregar o âcrapwareâ junto com um sistema operacional não livre é
uma "
-"prática comum, mas fazer o âcrapwareâ não poder ser excluÃdo, Facebook
e "
-"Samsung (<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/"
-"samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">entre outros</"
-"a>) estão indo um passo adiante em seu sequestro de dispositivos dos "
-"usuários."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -494,6 +485,38 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/"
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
+#~ "a>. <a href=\"https://www.infopackets.com/news/10484/truth-behind-"
+#~ "undeletable-facebook-app\"> Facebook claims this is a stub</a> which "
+#~ "doesn't do anything, but we have to take their word for it, and there is "
+#~ "the permanent risk that the app will be activated by an automatic update."
+#~ msgstr ""
+#~ "Os telefones Samsung vêm pré-carregados com <a href=\"https://www."
+#~ "bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-"
+#~ "they-can-t-delete-facebook\"> uma versão do aplicativo do Facebook que "
+#~ "não pode ser excluÃda </a>. <a href=\"https://www.infopackets.com/"
+#~ "news/10484/truth-behind-undeletable-facebook-app\"> O Facebook alega que "
+#~ "este é um esboço</a> que não faz nada, mas nós temos que aceitar a "
+#~ "palavra deles nisso, e há o risco permanente de que o aplicativo será "
+#~ "ativado por uma atualização automática."
+
+#~ msgid ""
+#~ "Preloading crapware along with a nonfree operating system is common "
+#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
+#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-"
+#~ "phone-users-get-a-shock-they-can-t-delete-facebook\">among others</a>) "
+#~ "are going one step further in their hijacking of users' devices."
+#~ msgstr ""
+#~ "Pré-carregar o âcrapwareâ junto com um sistema operacional não livre
é "
+#~ "uma prática comum, mas fazer o âcrapwareâ não poder ser excluÃdo, "
+#~ "Facebook e Samsung (<a href=\"https://www.bloomberg.com/news/"
+#~ "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+#~ "facebook\">entre outros</a>) estão indo um passo adiante em seu sequestro
"
+#~ "de dispositivos dos usuários."
+
+#~ msgid ""
#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.ru.po 7 Feb 2019 13:30:31 -0000 1.145
+++ proprietary.ru.po 8 Feb 2019 08:59:37 -0000 1.146
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -400,39 +425,6 @@
"не избавлÑÐµÑ Ð¾Ñ Ð½ÐµÑпÑаведливоÑÑи
неÑвободнÑÑ
пÑогÑамм. Ðозможно, ÑÑо "
"позволÑÐµÑ Ð½Ðµ плаÑиÑÑ Ð·Ð° ÑÑÑ Ð³Ð°Ð´Ð¾ÑÑÑ, но
менÑÑей гадоÑÑÑÑ ÑÑо ее не делаеÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-"ТелеÑÐ¾Ð½Ñ Samsung пÑодаÑÑÑÑ Ñ <a
href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> веÑÑией пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Facebook, коÑоÑÑÑ
нелÑÐ·Ñ ÑдалиÑÑ</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook ÑвеÑÑеÑ, ÑÑо ÑÑо заглÑÑка</a>,
коÑоÑÐ°Ñ Ð½Ð¸Ñего не делаеÑ, но "
-"нам оÑÑаеÑÑÑ ÑолÑко веÑиÑÑ Ð¸Ð¼ на Ñлово, и
вÑегда еÑÑÑ ÑиÑк, ÑÑо пÑиложение "
-"бÑÐ´ÐµÑ Ð°ÐºÑивиÑовано пÑи авÑомаÑиÑеÑком
обновлении."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-"ÐоÑÑавка заÑ
ламлÑÑÑиÑ
ÑÑÑÑойÑÑво
пÑогÑамм Ñ Ð½ÐµÑвободной опеÑаÑионной "
-"ÑиÑÑемой — обÑÑÐ½Ð°Ñ Ð¿ÑакÑика, но
Ð´ÐµÐ»Ð°Ñ ÑÑи пÑогÑÐ°Ð¼Ð¼Ñ Ð½ÐµÑдалÑемÑми, "
-"Facebook и Samsung (<a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\">в ÑиÑле пÑоÑиÑ
</a>) делаÑÑ ÐµÑе один
Ñаг к заÑ
ваÑÑ ÑÑÑойÑÑв "
-"полÑзоваÑелей."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -512,6 +504,37 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/"
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
+#~ "a>. <a href=\"https://www.infopackets.com/news/10484/truth-behind-"
+#~ "undeletable-facebook-app\"> Facebook claims this is a stub</a> which "
+#~ "doesn't do anything, but we have to take their word for it, and there is "
+#~ "the permanent risk that the app will be activated by an automatic update."
+#~ msgstr ""
+#~ "ТелеÑÐ¾Ð½Ñ Samsung пÑодаÑÑÑÑ Ñ <a
href=\"https://www.bloomberg.com/news/"
+#~ "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+#~ "facebook\"> веÑÑией пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Facebook, коÑоÑÑÑ
нелÑÐ·Ñ ÑдалиÑÑ</a>. <a "
+#~ "href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-"
+#~ "facebook-app\"> Facebook ÑвеÑÑеÑ, ÑÑо ÑÑо
заглÑÑка</a>, коÑоÑÐ°Ñ Ð½Ð¸Ñего не "
+#~ "делаеÑ, но нам оÑÑаеÑÑÑ ÑолÑко веÑиÑÑ Ð¸Ð¼
на Ñлово, и вÑегда еÑÑÑ ÑиÑк, "
+#~ "ÑÑо пÑиложение бÑÐ´ÐµÑ Ð°ÐºÑивиÑовано пÑи
авÑомаÑиÑеÑком обновлении."
+
+#~ msgid ""
+#~ "Preloading crapware along with a nonfree operating system is common "
+#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
+#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-"
+#~ "phone-users-get-a-shock-they-can-t-delete-facebook\">among others</a>) "
+#~ "are going one step further in their hijacking of users' devices."
+#~ msgstr ""
+#~ "ÐоÑÑавка заÑ
ламлÑÑÑиÑ
ÑÑÑÑойÑÑво
пÑогÑамм Ñ Ð½ÐµÑвободной опеÑаÑионной "
+#~ "ÑиÑÑемой — обÑÑÐ½Ð°Ñ Ð¿ÑакÑика, но
Ð´ÐµÐ»Ð°Ñ ÑÑи пÑогÑÐ°Ð¼Ð¼Ñ "
+#~ "неÑдалÑемÑми, Facebook и Samsung (<a
href=\"https://www.bloomberg.com/"
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\">в ÑиÑле пÑоÑиÑ
</a>) делаÑÑ ÐµÑе
один Ñаг к заÑ
ваÑÑ "
+#~ "ÑÑÑойÑÑв полÑзоваÑелей."
+
+#~ msgid ""
#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary.zh-tw-diff.html 7 Feb 2019 10:59:50 -0000 1.32
+++ proprietary.zh-tw-diff.html 8 Feb 2019 08:59:37 -0000 1.33
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -123,9 +123,9 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -183,6 +183,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are _not_ <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
<li id="M201902040">
<p>Google invites people to <a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
@@ -232,21 +251,6 @@
is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
- <li id="M201901110">
- <p>Samsung phones come preloaded with <a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
- a version of the Facebook app that can't be deleted</a>. <a
-
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app">
- Facebook claims this is a stub</a> which doesn't do anything, but we
- have to take their word for it, and there is the permanent risk that
- the app will be activated by an automatic update.</p>
-
- <p>Preloading crapware along with a nonfree operating system is
common
- practice, but by making the crapware undeletable, Facebook and Samsung
(<a
-
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
- are going one step further in their hijacking of users' devices.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary.zh-tw.po 7 Feb 2019 10:59:50 -0000 1.43
+++ proprietary.zh-tw.po 8 Feb 2019 08:59:37 -0000 1.44
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google invites people to <a href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -410,26 +434,6 @@
"nasty thing, but cannot make it less nasty."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- pt-br.po 7 Feb 2019 10:59:50 -0000 1.32
+++ pt-br.po 8 Feb 2019 08:59:37 -0000 1.33
@@ -4000,6 +4000,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- ru.po 7 Feb 2019 13:17:26 -0000 1.55
+++ ru.po 8 Feb 2019 08:59:37 -0000 1.56
@@ -4012,7 +4012,8 @@
"Google пÑиглаÑÐ°ÐµÑ Ð»Ñдей <a
href=\"https://www.commondreams.org/"
"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
"origin=rss\"> позволиÑÑ Google наблÑдаÑÑ Ð·Ð°
иÑполÑзованием иÑ
ÑелеÑона и "
-"вÑем иÑполÑзованием ÐнÑеÑнеÑа в иÑ
домаÑ
за ÑкÑÑÑаваганÑнÑÑ Ð¿Ð»Ð°ÑÑ 20 доллаÑов</a>."
+"вÑем иÑполÑзованием ÐнÑеÑнеÑа в иÑ
домаÑ
за ÑкÑÑÑаваганÑнÑÑ Ð¿Ð»Ð°ÑÑ 20 "
+"доллаÑов</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -4021,10 +4022,10 @@
"in a way that encourages most people to ignore the details. That, we "
"believe, makes it fitting to list here."
msgstr ""
-"ÐÑо не вÑедоноÑÐ½Ð°Ñ ÑÑнкÑÐ¸Ñ Ð¿ÑогÑаммÑ, Ñ
коÑоÑой еÑÑÑ ÐºÐ°ÐºÐ¾Ðµ-Ñо дÑÑгое назнаÑение; "
-"ÑÑо единÑÑвенное назнаÑение пÑогÑаммÑ,
Google Ñак и говоÑиÑ. Ðо Google говоÑÐ¸Ñ "
-"ÑÑо Ñак, ÑÑÐ¾Ð±Ñ Ð»Ñди не обÑаÑали вниманиÑ
на подÑобноÑÑи. ÐÑ ÑÑиÑаем, ÑÑо ÑÑо "
-"Ð´ÐµÐ»Ð°ÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾Ð´Ñ
одÑÑей Ð´Ð»Ñ Ð½Ð°Ñего
ÑпиÑка."
+"ÐÑо не вÑедоноÑÐ½Ð°Ñ ÑÑнкÑÐ¸Ñ Ð¿ÑогÑаммÑ, Ñ
коÑоÑой еÑÑÑ ÐºÐ°ÐºÐ¾Ðµ-Ñо дÑÑгое "
+"назнаÑение; ÑÑо единÑÑвенное назнаÑение
пÑогÑаммÑ, Google Ñак и говоÑиÑ. Ðо "
+"Google говоÑÐ¸Ñ ÑÑо Ñак, ÑÑÐ¾Ð±Ñ Ð»Ñди не
обÑаÑали Ð²Ð½Ð¸Ð¼Ð°Ð½Ð¸Ñ Ð½Ð° подÑобноÑÑи. ÐÑ "
+"ÑÑиÑаем, ÑÑо ÑÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾Ð´Ñ
одÑÑей Ð´Ð»Ñ Ð½Ð°Ñего ÑпиÑка."
#. type: Content of: <ul><li><p>
msgid ""
@@ -5585,6 +5586,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- zh-tw.po 7 Feb 2019 10:59:50 -0000 1.23
+++ zh-tw.po 8 Feb 2019 08:59:37 -0000 1.24
@@ -3886,6 +3886,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
+"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code—often used for invasive advertising—that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www."
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about “free apps.” "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Weather Channel app <a href=\"https://www.theguardian.com/"
"technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
"stored users' locations to the company's server</a>. The company is being "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/24
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28