[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 4 Mar 2019 03:00:40 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/03/04 03:00:38
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.386&r2=1.387
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.483&r2=1.484
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.39&r2=1.40
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- de.po 28 Feb 2019 22:00:38 -0000 1.39
+++ de.po 4 Mar 2019 08:00:36 -0000 1.40
@@ -7259,6 +7259,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- es.po 28 Feb 2019 22:00:38 -0000 1.49
+++ es.po 4 Mar 2019 08:00:36 -0000 1.50
@@ -5304,6 +5304,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- fr.po 28 Feb 2019 22:17:16 -0000 1.68
+++ fr.po 4 Mar 2019 08:00:36 -0000 1.69
@@ -5781,6 +5781,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- it.po 28 Feb 2019 22:00:38 -0000 1.39
+++ it.po 4 Mar 2019 08:00:36 -0000 1.40
@@ -6832,6 +6832,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- ja.po 28 Feb 2019 22:00:38 -0000 1.39
+++ ja.po 4 Mar 2019 08:00:36 -0000 1.40
@@ -5807,6 +5807,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-mobiles.de-diff.html 28 Feb 2019 09:30:38 -0000 1.43
+++ malware-mobiles.de-diff.html 4 Mar 2019 08:00:36 -0000 1.44
@@ -404,7 +404,7 @@
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
meant</strong></del></span> <span class="inserted"><ins><em>these apps
are proprietary it makes it
- hard</em></ins></span> to <span class="removed"><del><strong>track users
and show them targeted</strong></del></span> <span
class="inserted"><ins><em>impossible to know which apps are at risk.</p>
+ hard</em></ins></span> to <span class="removed"><del><strong>track users
and show them</strong></del></span> <span class="inserted"><ins><em>impossible
to know which apps are at risk.</p>
</li>
<li id="M201405190">
@@ -506,6 +506,25 @@
developers of other nonfree programs.</p>
</li>
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -777,7 +796,7 @@
<dl class="compact">
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted</em></ins></span>
ads.</dd>
+ meant to track users and show them</em></ins></span> targeted
ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
@@ -1276,7 +1295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:30:38 $
+$Date: 2019/03/04 08:00:36 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- malware-mobiles.de.po 28 Feb 2019 09:30:38 -0000 1.100
+++ malware-mobiles.de.po 4 Mar 2019 08:00:37 -0000 1.101
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -813,6 +813,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- malware-mobiles.es.po 28 Feb 2019 09:30:38 -0000 1.106
+++ malware-mobiles.es.po 4 Mar 2019 08:00:37 -0000 1.107
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -703,6 +703,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- malware-mobiles.fr.po 28 Feb 2019 22:17:16 -0000 1.127
+++ malware-mobiles.fr.po 4 Mar 2019 08:00:37 -0000 1.128
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2019-02-28 23:15+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -711,6 +712,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- malware-mobiles.it-diff.html 28 Feb 2019 09:30:38 -0000 1.48
+++ malware-mobiles.it-diff.html 4 Mar 2019 08:00:37 -0000 1.49
@@ -193,30 +193,29 @@
<li>
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be hijacked through their Wi-Fi chips</a> because of a bug in
- Broadcom's non-free firmware.</p>
+ can be hijacked through their Wi-Fi chips</a> because of a
bug</strong></del></span>
+ <span class="inserted"><ins><em>change the software</em></ins></span> in
+ <span class="removed"><del><strong>Broadcom's non-free
firmware.</p>
</li>
<li>
<p>Samsung
phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
-a security hole that allows an SMS message to install
+a security hole that allows an SMS message</strong></del></span> <span
class="inserted"><ins><em>the main processor. They still have the
+ back door, but at least it is unable</em></ins></span> to <span
class="removed"><del><strong>install
ransomware</a>.</p>
</li>
<li>
<p>Many proprietary payment apps <a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
-transmit personal data</strong></del></span>
- <span class="inserted"><ins><em>change the software</em></ins></span> in
<span class="removed"><del><strong>an insecure way</a>.
-However,</strong></del></span> the <span class="removed"><del><strong>worse
aspect of these apps</strong></del></span> <span class="inserted"><ins><em>main
processor. They still have the
- back door, but at least it</em></ins></span> is <span
class="removed"><del><strong>that
-<a
href="/philosophy/surveillance-vs-democracy.html">payment</strong></del></span>
<span class="inserted"><ins><em>unable to turn the phone unto a
+transmit personal data in an insecure way</a>.
+However,</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>worse aspect of these apps</strong></del></span>
<span class="inserted"><ins><em>phone unto a
listening device.</p>
- <p>The universal back door</em></ins></span> is <span
class="removed"><del><strong>not anonymous</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>apparently
also used to make phones <a
-
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ <p>The universal back door</em></ins></span> is <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>apparently also used to make phones</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
+</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their
movements
are tracked, and may also make the listening feature
work.</p></em></ins></span>
</li>
@@ -534,6 +533,25 @@
developers of other nonfree programs.</p>
</li>
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -1304,7 +1322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:30:38 $
+$Date: 2019/03/04 08:00:37 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- malware-mobiles.it.po 28 Feb 2019 09:30:39 -0000 1.100
+++ malware-mobiles.it.po 4 Mar 2019 08:00:37 -0000 1.101
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -782,6 +782,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- malware-mobiles.ja-diff.html 28 Feb 2019 09:30:39 -0000 1.62
+++ malware-mobiles.ja-diff.html 4 Mar 2019 08:00:37 -0000 1.63
@@ -330,7 +330,7 @@
modem that tells big brother all</em></ins></span> the <span
class="removed"><del><strong><em>developer</em>
gets</strong></del></span> <span class="inserted"><ins><em>time
where</em></ins></span> it <span class="removed"><del><strong>all.
This “service” is for suckers!</p>
-<p>The server surely has</strong></del></span> <span
class="inserted"><ins><em>is. If you own
+<p>The server surely</strong></del></span> <span
class="inserted"><ins><em>is. If you own
such a car, it would be wise to disconnect the modem so as to turn
off the tracking.</p>
</li>
@@ -369,7 +369,7 @@
personal data to a server, where the <em>developer</em> gets
it all.
This “service” is for suckers!</p>
- <p>The server surely has</em></ins></span> a “privacy
policy,” and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>surely
+ <p>The server surely</em></ins></span> has a “privacy
policy,” and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>surely
it is worthless since nearly all of them are.</p>
</li>
@@ -498,6 +498,25 @@
developers of other nonfree programs.</p>
</li>
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -1148,7 +1167,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 09:30:39 $
+$Date: 2019/03/04 08:00:37 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-mobiles.ja.po 28 Feb 2019 09:30:39 -0000 1.88
+++ malware-mobiles.ja.po 4 Mar 2019 08:00:37 -0000 1.89
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -651,6 +651,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- malware-mobiles.pot 28 Feb 2019 09:30:39 -0000 1.66
+++ malware-mobiles.pot 4 Mar 2019 08:00:37 -0000 1.67
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -483,6 +483,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a "
+"href=\"https://www.appcensus.mobi\"> how Android apps use and misuse users' "
+"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
+"which 24,000 (31%) transmit the <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201812290\"> Advertising "
+"ID</a> to other companies, and <a "
+"href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> "
+"18,000 (23% of the total) link this ID to hardware identifiers</a>, so that "
+"users cannot escape tracking by resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a "
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
"recording all the users' actions</a> in interacting with the app."
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- malware-mobiles.ru.po 28 Feb 2019 10:00:08 -0000 1.161
+++ malware-mobiles.ru.po 4 Mar 2019 08:00:37 -0000 1.162
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -701,6 +702,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- nl.po 28 Feb 2019 22:00:38 -0000 1.39
+++ nl.po 4 Mar 2019 08:00:37 -0000 1.40
@@ -4589,6 +4589,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- pl.po 28 Feb 2019 22:00:38 -0000 1.39
+++ pl.po 4 Mar 2019 08:00:37 -0000 1.40
@@ -4033,6 +4033,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- pot 28 Feb 2019 22:00:38 -0000 1.39
+++ pot 4 Mar 2019 08:00:37 -0000 1.40
@@ -3856,6 +3856,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-surveillance.de-diff.html 28 Feb 2019 22:00:39 -0000
1.51
+++ proprietary-surveillance.de-diff.html 4 Mar 2019 08:00:37 -0000
1.52
@@ -656,26 +656,32 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it <a
+ <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
+ illegal</em></ins></span> to <span class="removed"><del><strong>read logs
+ for other apps</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
<p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>also core system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ know you want</em></ins></span> to <span
class="removed"><del><strong>LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>be spied on”.</p>
</li>
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
+ to use</em></ins></span> it <span class="inserted"><ins><em>without having
your fingerprints taken. Users would have
no way to tell whether the phone is snooping on them.</p>
</li>
@@ -690,14 +696,18 @@
<p>iThings automatically upload to Apple's servers all the photos
and videos they make.</p>
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
+ <blockquote><p> iCloud Photo Library</em></ins></span> stores
<span class="removed"><del><strong>detailed logs</strong></del></span> <span
class="inserted"><ins><em>every photo</em></ins></span> and <span
class="removed"><del><strong>may turn</strong></del></span> <span
class="inserted"><ins><em>video you
+ take, and keeps</em></ins></span> them <span
class="removed"><del><strong>over</strong></del></span> <span
class="inserted"><ins><em>up</em></ins></span> to <span
class="inserted"><ins><em>date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means “please
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into</strong></del></span>
+ <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
<p>There is a way to
@@ -802,9 +812,8 @@
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>location tracking, you must
- disable Google Play itself to completely stop</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>tracking.
This is
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
@@ -838,45 +847,38 @@
sold. Some Motorola phones, made when this company was owned
by Google, use a modified version of Android that <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>read logs</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ sends personal data to Motorola</a>.</p>
</li>
<li id="M201307250">
<p>A Motorola phone <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</em></ins></span> for <span class="removed"><del><strong>other
apps and also core system logs. TigerVPN</strong></del></span> <span
class="inserted"><ins><em>voice all the time</a>.</p>
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>HTML pages returned to</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201302150">
- <p>Google Play intentionally sends app</em></ins></span> developers
- <span class="removed"><del><strong>have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
- and may turn them over to</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Google Play intentionally sends app developers <a
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</strong></del></span> <span
class="inserted"><ins><em>personal details of users that
install</em></ins></span> the <span class="removed"><del><strong>HTML pages
returned to</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+ the
+ <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span class="inserted"><ins><em>personal
details</em></ins></span> of <span class="inserted"><ins><em>users that
install</em></ins></span> the <span class="removed"><del><strong>JS injection
is to display
+ ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
<p>Merely asking</em></ins></span> the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span
class="inserted"><ins><em>“consent”</em></ins></span> of <span
class="removed"><del><strong>the JS injection</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> is <span
class="inserted"><ins><em>not enough</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading the “Terms and Conditions” that spell out what
- they are “consenting” to. Google should clearly and
- honestly identify the information</em></ins></span> it <span
class="removed"><del><strong>redirects</strong></del></span> <span
class="inserted"><ins><em>collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
-
- <p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information
in</em></ins></span> the
<span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects</strong></del></span>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>“consent”</em></ins></span> of <span
class="inserted"><ins><em>users is not enough to
+ legitimize actions like this. At</em></ins></span> this <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>point, most users</em></ins></span> have
+ <span class="removed"><del><strong>confirmed</strong></del></span> <span
class="inserted"><ins><em>stopped
+ reading the “Terms and Conditions”</em></ins></span> that
<span class="inserted"><ins><em>spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify</em></ins></span> the <span
class="removed"><del><strong>non-premium version</strong></del></span> <span
class="inserted"><ins><em>information it collects on users,
instead</em></ins></span> of
+ <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information
in</em></ins></span> the <span class="removed"><del><strong>app
does</strong></del></span>
<span class="inserted"><ins><em>first place!</p>
</li>
@@ -895,14 +897,15 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain</em></ins></span> JavaScript <span
class="removed"><del><strong>code into HTML pages,</strong></del></span> <span
class="inserted"><ins><em>code,</em></ins></span> and <span
class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers of</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>E-books can contain</em></ins></span> JavaScript <span
class="removed"><del><strong>injection for tracking</strong></del></span> <span
class="inserted"><ins><em>code,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl></strong></del></span> <span class="inserted"><ins><em><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes</em></ins></span> this <span class="removed"><del><strong>app
have
- confirmed that</strong></del></span> <span
class="inserted"><ins><em>code snoops on readers</a>.</p>
+ sometimes this code snoops on
readers</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
- <li id="M201410080">
+ <span class="inserted"><ins><em><li id="M201410080">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
@@ -911,20 +914,16 @@
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>non-premium version of</strong></del></span>
<span class="inserted"><ins><em>Kindle: <a
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>2015</a> found</strong></del></span> <span
class="inserted"><ins><em>many e-readers—not only the Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report even which page</em></ins></span> the <span
class="removed"><del><strong>app does
- JavaScript injection for tracking and display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>user reads
at what time</a>.</p></em></ins></span>
+ report even which page the user reads at what time</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware</em></ins></span> in <span
class="removed"><del><strong>2015</a> found</strong></del></span> <span
class="inserted"><ins><em>Applications</h3>
+ <h3 id="SpywareInApplications">Spyware in Applications</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -958,10 +957,7 @@
</li>
<span class="removed"><del><strong><li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With</strong></del></span>
+ <p>Apps</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -971,35 +967,56 @@
<ul class="blurbs">
<li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary
- <span class="inserted"><ins><em>library for building
mobile</em></ins></span> apps, <span class="removed"><del><strong>one can only
hope that they don't.</p>
-</li>
+ <p>Facebook offered a convenient proprietary
+ library</em></ins></span> for <span class="removed"><del><strong>BART
+ <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software</strong></del></span> <span
class="inserted"><ins><em>building mobile</em></ins></span> apps, <span
class="removed"><del><strong>users could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>which
also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing</em></ins></span> that
<span class="inserted"><ins><em>all the personal
+ data</em></ins></span> they <span class="removed"><del><strong>don't
snoop.</p>
+ <p>With proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>collected would go to Facebook as well.</p>
-<li>
- <p>A study found 234 Android apps that track users
by</strong></del></span> <span class="inserted"><ins><em>which
also</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <p>It shows that no</em></ins></span> one can <span
class="removed"><del><strong>only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>trust a
nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.
</p>
</li>
<li>
- <p>Pairs of Android apps can collude to transmit
users'</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent</em></ins></span> personal data to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots</em></ins></span> of <span
class="removed"><del><strong>pairs</strong></del></span> <span
class="inserted"><ins><em>companies built apps</em></ins></span> that <span
class="removed"><del><strong>collude</a>.</p>
+ <p>Pairs of</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi">
how</em></ins></span> Android apps <span class="removed"><del><strong>can
collude to transmit</strong></del></span> <span class="inserted"><ins><em>use
and
+ misuse</em></ins></span> users' personal
+ <span class="removed"><del><strong>data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens</strong></del></span> <span
class="inserted"><ins><em>data</a>. As</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
+ 78,000 have been analyzed,</em></ins></span> of <span
class="removed"><del><strong>pairs that collude</a>.</p>
</li>
<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span class="inserted"><ins><em>way and released them, apparently not
realizing that all</em></ins></span> the personal <span
class="removed"><del><strong>details of users</strong></del></span>
- <span class="inserted"><ins><em>data they collected would go to Facebook
as well.</p>
-
- <p>It shows</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>no one can trust a nonfree program, not
even</em></ins></span> the <span
class="removed"><del><strong>“consent”</strong></del></span>
- <span class="inserted"><ins><em>developers</em></ins></span> of <span
class="removed"><del><strong>users is not enough
-to legitimize actions like this. At this point, most
users</strong></del></span> <span class="inserted"><ins><em>other nonfree
programs.</p>
+<p>Google Play intentionally sends app developers</strong></del></span>
<span class="inserted"><ins><em>which 24,000 (31%) transmit
the</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>personal details</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent
violation</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span>
+ <span class="inserted"><ins><em>Google's policies. But it
seems</em></ins></span> that <span class="removed"><del><strong>install the
app</a>.</p>
+
+<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>Google wasn't aware</em></ins></span> of <span
class="removed"><del><strong>users is not enough</strong></del></span> <span
class="inserted"><ins><em>it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users</strong></del></span> <span class="inserted"><ins><em>take action. This
proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
<li id="M201902060">
@@ -1970,8 +1987,8 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The
other day a woman came up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
+<p>Emo Phillips made a joke: The other day</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>woman came
up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see</em></ins></span> out
<span class="removed"><del><strong>who</strong></del></span> the <span
class="removed"><del><strong>user was.</p>
@@ -3277,7 +3294,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary-surveillance.de.po 28 Feb 2019 22:00:39 -0000 1.266
+++ proprietary-surveillance.de.po 4 Mar 2019 08:00:37 -0000 1.267
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1864,6 +1864,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.386
retrieving revision 1.387
diff -u -b -r1.386 -r1.387
--- proprietary-surveillance.fr.po 28 Feb 2019 22:17:16 -0000 1.386
+++ proprietary-surveillance.fr.po 4 Mar 2019 08:00:37 -0000 1.387
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2019-02-28 23:15+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1430,6 +1431,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary-surveillance.it-diff.html 28 Feb 2019 22:00:39 -0000
1.118
+++ proprietary-surveillance.it-diff.html 4 Mar 2019 08:00:37 -0000
1.119
@@ -1153,78 +1153,96 @@
<span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps
that</em></ins></span> used <span class="inserted"><ins><em>to
- be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is in addition to
- the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the
user</a>. This is in addition to
+ the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
phone.</p>
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>redirecting
- them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>question</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
- users</strong></del></span> <span class="inserted"><ins><em>most of them
was designed</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
- difficult.</p>
-
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there</em></ins></span> is no <span class="removed"><del><strong>excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>easy way of knowing what they really
do.</p></em></ins></span>
+ <p>Don't be distracted by the question</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>.
As</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users</strong></del></span> <span class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>other companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies.</a></p>
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not
- ask about sending it to other companies. This shows the
- weakness</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation</em></ins></span> of the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p>
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
+ that</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
+ app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
+ their programs.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Games</h4>
+ <h4 id="SpywareInGames">Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>Google Play
found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>interacting
with the app.</p>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span> <span class="inserted"><ins><em>protect
their usersâ privacy</a> due to DNS leaks. In
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>often malicious ads
on users, and redirecting</em></ins></span>
+ them to
+ <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,
+ the user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used</em></ins></span> for <span
class="removed"><del><strong>companies, and the NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>invasive
advertising—that could
potentially also be used</em></ins></span> to spy <span
class="removed"><del><strong>through it too</a>.
@@ -1257,59 +1275,57 @@
<p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations</em></ins></span> to <span
class="removed"><del><strong>Nuance Communications</a>,
- a speech recognition company based in</strong></del></span> the <span
class="removed"><del><strong>U.S.</p>
+ a speech recognition</strong></del></span> <span
class="inserted"><ins><em>the company's server</a>. The</em></ins></span>
company <span class="removed"><del><strong>based in</strong></del></span> <span
class="inserted"><ins><em>is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>toys</strong></del></span> <span
class="inserted"><ins><em>users of what it will do</em></ins></span>
+ can remotely control the toys</strong></del></span> <span
class="inserted"><ins><em>users of what it will do</em></ins></span>
with <span class="inserted"><ins><em>the data.</p>
<p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in on a child's speech, and even speak
- into</strong></del></span> <span class="inserted"><ins><em>side issue.
What</em></ins></span> the <span class="removed"><del><strong>toys
themselves.</p>
+ enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>side issue. What the company does
+ with the data is</em></ins></span> a <span
class="removed"><del><strong>child's speech, and even speak
+ into</strong></del></span> <span class="inserted"><ins><em>secondary
issue. The principal wrong here is that</em></ins></span>
+ the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>company gets that data at all.</p>
+
+ <p><a
+
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
</li>
- <li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through</strong></del></span> <span
class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>proprietary
control app</a>.</p>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>data
is</em></ins></span> a <span class="removed"><del><strong>person's
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on <span class="removed"><del><strong>its users
through</strong></del></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
+
+ <p>The app was reporting</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
+
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>was surrounded by a person's
body), as well as the vibration frequency.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>secondary issue. The principal wrong here is
that</em></ins></span>
- the <span class="removed"><del><strong>totally inadequate proposed
response: a labeling
+ <p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about
their products, rather than free software which users could have
checked and changed.</p>
- <p>The</strong></del></span> company <span
class="inserted"><ins><em>gets</em></ins></span> that <span
class="removed"><del><strong>made the vibrator
+ <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>vibrator
<a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>data at all.</p>
-
- <p><a
-
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ was sued for collecting lots</strong></del></span> <span
class="inserted"><ins><em>same machine via
+ various apps. Some</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>them send Facebook detailed</em></ins></span>
information about <span class="removed"><del><strong>how
people used it</a>.</p>
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,”
so</em></ins></span> that <span class="removed"><del><strong>it was
anonymizing</strong></del></span>
- <span class="inserted"><ins><em>Facebook can correlate</em></ins></span>
the data <span class="removed"><del><strong>may be
- true, but it doesn't really matter. If</strong></del></span> it <span
class="removed"><del><strong>had sold</strong></del></span> <span
class="inserted"><ins><em>obtains from</em></ins></span> the <span
class="removed"><del><strong>data to a
- data broker,</strong></del></span> <span class="inserted"><ins><em>same
machine via
- various apps. Some of them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>data broker would have been able to
figure out
- who</strong></del></span> <span class="inserted"><ins><em>user's
activities in the app; others only say that</em></ins></span> the user <span
class="removed"><del><strong>was.</p>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
+ the <span class="removed"><del><strong>data to a
+ data broker,</strong></del></span> <span
class="inserted"><ins><em>user's activities in</em></ins></span> the <span
class="removed"><del><strong>data broker would have been able to figure out
+ who</strong></del></span> <span class="inserted"><ins><em>app; others
only say that</em></ins></span> the user <span
class="removed"><del><strong>was.</p>
<p>Following this lawsuit,
<a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>is
@@ -1345,7 +1361,7 @@
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="removed"><del><strong>the FBI could listen</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
+ the <span class="removed"><del><strong>manufacturer</strong></del></span>
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
@@ -1510,7 +1526,7 @@
<p>A “smart” device means</strong></del></span>
<span class="inserted"><ins><em>worked in various ways to prevent that,
and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>snooping of these apps.</p>
+ for</em></ins></span> the <span class="removed"><del><strong>manufacturer
is using it</strong></del></span> <span class="inserted"><ins><em>snooping of
these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
@@ -1519,7 +1535,7 @@
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There</em></ins></span> is <span
class="removed"><del><strong>using it</strong></del></span> <span
class="inserted"><ins><em>no systematic way for Google, or Android users,
+ cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
@@ -3035,7 +3051,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary-surveillance.it.po 28 Feb 2019 22:00:39 -0000 1.279
+++ proprietary-surveillance.it.po 4 Mar 2019 08:00:37 -0000 1.280
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1814,6 +1814,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary-surveillance.ja-diff.html 28 Feb 2019 22:00:39 -0000
1.128
+++ proprietary-surveillance.ja-diff.html 4 Mar 2019 08:00:37 -0000
1.129
@@ -1047,84 +1047,83 @@
<span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
</li>
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Widely</strong></del></span>
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps
that</em></ins></span> used <span class="inserted"><ins><em>to
- be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted and often malicious ads</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is in addition to
- the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
+ <span class="inserted"><ins><em><li id="M201902140">
+ <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span>
+ <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android</em></ins></span> apps <span class="removed"><del><strong>snoop
on</strong></del></span> <span class="inserted"><ins><em>use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>perhaps by
the OS in the
phone.</p>
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>redirecting
- them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>question</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
- users</strong></del></span> <span class="inserted"><ins><em>most of them
was designed</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
- difficult.</p>
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23%</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> the <span
class="removed"><del><strong>app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>total) link
this ID</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
- <p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away from nonfree apps in
- general. <em>All</em> nonfree apps carry a potential risk
because
- there</em></ins></span> is no <span class="removed"><del><strong>excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>easy way of knowing what they really
do.</p></em></ins></span>
+ <p>Collecting hardware identifiers</em></ins></span> is <span
class="removed"><del><strong>no excuse for malware.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <li><p>The Brightest Flashlight app
<a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies.</a></p>
<p>The FTC criticized this app because it asked the user to
approve sending personal data to the app developer but did not
- ask about sending it to other companies. This shows the
- weakness</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation</em></ins></span> of the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
- app send any information to anyone? A free software flashlight
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
+ that</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
+ app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
app would not.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Games</h4>
+ <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>developers from including malware</em></ins></span>
in <span class="removed"><del><strong>Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>Google Play
found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p></em></ins></span>
</li>
- <li><p>Angry Birds
+ <span class="removed"><del><strong><li><p>Angry Birds
<a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</strong></del></span> <span class="inserted"><ins><em>protect
their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>companies, and the NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>invasive
advertising—that could
- potentially also be used</em></ins></span> to spy <span
class="removed"><del><strong>through it too</a>.
- Here's information</strong></del></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
+ spies</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>companies, and</strong></del></span>
<span class="inserted"><ins><em><a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>spy through it
too</a>.
+ Here's information</strong></del></span>
+ <span class="inserted"><ins><em>be</em></ins></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>Google Play had one or</em></ins></span> more
<span class="removed"><del><strong>spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
More about NSA app spying</a>.</p>
</li>
@@ -1138,206 +1137,270 @@
<ul>
- <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
+ <li><p>A company that makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>personal information about how
+ people use it</a>.</p>
+
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites</em></ins></span> that <span
class="removed"><del><strong>it anonymizes the data may be
+ true, but it doesn't really matter. If it sells</strong></del></span>
<span class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>user interface of most of them was
designed</em></ins></span> to <span class="inserted"><ins><em>make
uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>potential risk because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
+ <li id="M201902010">
+ <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out who the user
is.</p>
+ </li>
+
+ <li><p>A computerized
+ vibrator</strong></del></span> <span class="inserted"><ins><em>150
most popular
+ gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy</em></ins></span> on <span
class="removed"><del><strong>its users through</strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="removed"><del><strong>makes internet-controlled
vibrators</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal
information</strong></del></span>
- <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
- <p>It is unfortunate that these articles talk</em></ins></span>
about <span class="removed"><del><strong>how
- people use it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“free
+ <p>It is unfortunate that these articles talk about “free
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
<li id="M201901050"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Weather Channel app <a
+ <p>The <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the</em></ins></span> company's <span
class="removed"><del><strong>statement</strong></del></span> <span
class="inserted"><ins><em>server</a>. The company is
- being sued, demanding</em></ins></span> that it <span
class="removed"><del><strong>anonymizes</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>sells the data to</strong></del></span> <span
class="inserted"><ins><em>will do
+ stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="inserted"><ins><em>will do
with the data.</p>
- <p>I think that lawsuit is about</em></ins></span> a <span
class="inserted"><ins><em>side issue. What the company does
- with the</em></ins></span> data <span
class="removed"><del><strong>broker,</strong></del></span> <span
class="inserted"><ins><em>is a secondary issue. The principal wrong here is
that</em></ins></span>
- the <span class="inserted"><ins><em>company gets that</em></ins></span>
data <span class="removed"><del><strong>broker</strong></del></span> <span
class="inserted"><ins><em>at all.</p>
+ <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>surrounded by</strong></del></span> <span
class="inserted"><ins><em>about</em></ins></span> a <span
class="removed"><del><strong>person's
+ body), and</strong></del></span> <span class="inserted"><ins><em>side
issue. What</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>company does
+ with</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>data is</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users can
check</strong></del></span> <span class="inserted"><ins><em>secondary issue.
The principal wrong here is that
+ the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
+ Other weather apps</a>, including Accuweather</em></ins></span> and
<span class="removed"><del><strong>change.</p></strong></del></span>
<span class="inserted"><ins><em>WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on <span class="removed"><del><strong>children
and adults.</a>.</p>
+ </li>
+</ul>
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook</em></ins></span> can <span class="removed"><del><strong>figure
out who</strong></del></span> <span class="inserted"><ins><em>correlate the
data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
- <p>This spying occurs regardless of whether</em></ins></span> the
user <span class="removed"><del><strong>is.</p></strong></del></span>
<span class="inserted"><ins><em>has a Facebook
- account.</p></em></ins></span>
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>the user's actions</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same
machine</em></ins></span> via <span class="removed"><del><strong>BIOS</a>
on Windows installs.
+Note</strong></del></span>
+ <span class="inserted"><ins><em>various apps. Some of them send Facebook
detailed information about
+ the user's activities in the app; others only say</em></ins></span> that
the <span class="removed"><del><strong>specific sabotage method Lenovo used did
not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>not really
+clean since</strong></del></span>
+ <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
</li>
- <span class="removed"><del><strong><li><p>A computerized
- vibrator</strong></del></span>
+ <li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>disable “location
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span
class="inserted"><ins><em>Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p>
- </li>
+ <p>There are other ways to turn off the other
kinds</em></ins></span> of <span class="removed"><del><strong>Parliament
+ this way, because they pass it through Microsoft.</p></li>
- <li id="M201806110"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Spanish football
streaming</em></ins></span> app <span
class="removed"><del><strong>reports</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>temperature
of</strong></del></span> <span class="inserted"><ins><em>user's movements and
listens through</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>location
+ tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
- <p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect</em></ins></span> it <span
class="inserted"><ins><em>implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>surrounded
by</strong></del></span> <span class="inserted"><ins><em>no way to
save</em></ins></span>
- a <span class="removed"><del><strong>person's
- body), and the vibration frequency.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span>
the <span class="removed"><del><strong>totally inadequate proposed response: a
labeling
- standard with which manufacturers would make
statements</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
- <p>If you learn to care much less</em></ins></span> about
- <span class="removed"><del><strong>their products, rather than free
software which users can check
- and change.</p></strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>spy on
children</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and <span class="removed"><del><strong>adults.</a>.</p>
+ <p>This makes them act as spies</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>insecurely
snitch</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be</em></ins></span> sure <span
class="inserted"><ins><em>from the article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The Nest Cam “smart” camera</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span
class="inserted"><ins><em>one more.</p>
+ </li>
+
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop
+ and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>manufacturer is
using it</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="removed"><del><strong>outsmart
+ you.</p>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
<span class="inserted"><ins><em>insecurely snitch on its users. Furthermore,
they could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
+ <li><p>E-books</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and <span class="removed"><del><strong>spyware via BIOS</a> on
Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>the proprietary
apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="inserted"><ins><em><a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>specific sabotage method Lenovo
used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>user if an
app contains anti-features</a>.</p>
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
<li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
which users are HIV-positive, then provides the information to
companies</a>.</p>
- <p>Grindr should not have so much information
about</em></ins></span> its <span class="removed"><del><strong>own
malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>users.
- It could be designed so that users communicate such info</em></ins></span>
to <span class="removed"><del><strong>place new items on top
under</strong></del></span> each <span class="removed"><del><strong>subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span>
- <span class="inserted"><ins><em>other but not to</em></ins></span> the
<span class="removed"><del><strong>emails of members of Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
+ <p>Grindr should not have so much information about its users.
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
<p>The moviepass app and dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where</em></ins></span> they <span class="removed"><del><strong>pass it
through Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>travel before and after going to a
movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers</em></ins></span>
can <span class="removed"><del><strong>contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></em></ins></span>
+ networks</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware in Skype:</strong></del></span>
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
@@ -1345,17 +1408,17 @@
</li>
<li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
<p>Google did not intend to make these apps spy; on the contrary, it
worked in various ways to prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google</em></ins></span>
specifically
- for <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the snooping of these apps.</p>
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ <p>On the other hand, Google redistributes nonfree Android
apps,</em></ins></span> and
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
@@ -1372,16 +1435,10 @@
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p></em></ins></span>
+ public, so we can depend on each other.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705230">
+ <li id="M201705230">
<p>Apps for BART <a
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
@@ -1887,49 +1944,27 @@
<li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade”</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>make its TVs snoop</em></ins></span> on <span
class="inserted"><ins><em>what
- users watch</a>.</em></ins></span> The <span
class="removed"><del><strong>Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>TVs did not
do that when first sold.</p>
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is</strong></del></span> <span
class="inserted"><ins><em>Samsung “Smart” TV</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>and would then have to give it to</em></ins></span>
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>US or some
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and would then have to give it to the US or some
other government.</p>
- <p>Speech recognition</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>not to be trusted unless</em></ins></span> it <span
class="inserted"><ins><em>is done by free
+ <p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>third
- parties</a>.</p></em></ins></span>
+ data containing sensitive information will be transmitted to third
+ parties</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201411090">
+ <li id="M201411090">
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
@@ -1954,14 +1989,9 @@
</li>
<li id="M201405200">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript
code,</strong></del></span> <span class="inserted"><ins><em>LG
“smart” TVs <a
+ <p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and <span
class="inserted"><ins><em>the switch to turn this off has
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
@@ -2858,7 +2888,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary-surveillance.ja.po 28 Feb 2019 22:00:39 -0000 1.252
+++ proprietary-surveillance.ja.po 4 Mar 2019 08:00:38 -0000 1.253
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1507,6 +1507,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary-surveillance.pot 28 Feb 2019 22:00:39 -0000 1.200
+++ proprietary-surveillance.pot 4 Mar 2019 08:00:38 -0000 1.201
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1013,6 +1013,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a "
+"href=\"https://www.appcensus.mobi\"> how Android apps use and misuse users' "
+"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
+"which 24,000 (31%) transmit the <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201812290\"> Advertising "
+"ID</a> to other companies, and <a "
+"href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> "
+"18,000 (23% of the total) link this ID to hardware identifiers</a>, so that "
+"users cannot escape tracking by resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a "
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
"recording all the users' actions</a> in interacting with the app."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.483
retrieving revision 1.484
diff -u -b -r1.483 -r1.484
--- proprietary-surveillance.ru.po 1 Mar 2019 05:29:26 -0000 1.483
+++ proprietary-surveillance.ru.po 4 Mar 2019 08:00:38 -0000 1.484
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1417,6 +1418,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary.de-diff.html 28 Feb 2019 22:00:39 -0000 1.54
+++ proprietary.de-diff.html 4 Mar 2019 08:00:38 -0000 1.55
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -101,17 +101,17 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
@@ -125,9 +125,9 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
@@ -185,6 +185,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -252,14 +271,6 @@
firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
-
- <li id="M201902200">
- <p>Some portable surveillance
- devices (“phones”) now have <a
-
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g">
- fingerprint sensors in the display</a>. Does that imply they could
- take the fingerprint of anyone who operates the touch screen?</p>
- </li>
</ul></em></ins></span>
@@ -320,7 +331,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.de.po 28 Feb 2019 22:00:39 -0000 1.96
+++ proprietary.de.po 4 Mar 2019 08:00:38 -0000 1.97
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -513,15 +534,6 @@
"Or, as a last resort, you can replace your TV with another model."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.es.po 28 Feb 2019 22:00:39 -0000 1.109
+++ proprietary.es.po 4 Mar 2019 08:00:38 -0000 1.110
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2019-02-25 11:08+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -414,20 +435,6 @@
"las conexiones a los servidores de Vizio. O, como último recurso, sustituir "
"su televisor por otro modelo."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-"Algunos dispositivos portátiles de vigilancia («teléfonos») tienen ahora
<a "
-"href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\">lectores de "
-"huella dactilar en la pantalla</a>. ¿Supone esto que podrÃan registrar la "
-"huella dactilar de cualquiera que opere en la pantalla táctil?"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -507,6 +514,20 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Some portable surveillance devices (“phones”) now have <a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "fingerprint sensors in the display</a>. Does that imply they could take "
+#~ "the fingerprint of anyone who operates the touch screen?"
+#~ msgstr ""
+#~ "Algunos dispositivos portátiles de vigilancia («teléfonos») tienen
ahora "
+#~ "<a href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-"
+#~ "galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"
+#~ "\">lectores de huella dactilar en la pantalla</a>. ¿Supone esto que "
+#~ "podrÃan registrar la huella dactilar de cualquiera que opere en la "
+#~ "pantalla táctil?"
+
+#~ msgid ""
#~ "Twenty nine “beauty camera” apps that used to be on Google "
#~ "Play had one or more malicious functionalities, such as stealing users' "
#~ "photos instead of “beautifying” them, <a href=\"https://www."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.fr.po 28 Feb 2019 22:17:16 -0000 1.134
+++ proprietary.fr.po 4 Mar 2019 08:00:38 -0000 1.135
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2019-02-28 23:15+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -425,21 +447,6 @@
"aux serveurs de Vizio. Et en dernier ressort, vous pouvez toujours remplacer "
"votre téléviseur par un autre modèle. "
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-"Certains appareils portables de surveillance (appelés « téléphones ») "
-"possèdent maintenant un <a href=\"https://www.theguardian.com/"
-"technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-"
-"fingerprint-sensors-and-5g\">lecteur d'empreinte digitale dans l'écran</a>. "
-"Cela signifie-t-il qu'ils pourraient prendre l'empreinte digitale de toute "
-"personne se servant de l'écran tactile?"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,3 +520,17 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Some portable surveillance devices (“phones”) now have <a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "fingerprint sensors in the display</a>. Does that imply they could take "
+#~ "the fingerprint of anyone who operates the touch screen?"
+#~ msgstr ""
+#~ "Certains appareils portables de surveillance (appelés « téléphonesÂ
») "
+#~ "possèdent maintenant un <a href=\"https://www.theguardian.com/"
+#~ "technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-"
+#~ "ultrasonic-fingerprint-sensors-and-5g\">lecteur d'empreinte digitale dans "
+#~ "l'écran</a>. Cela signifie-t-il qu'ils pourraient prendre l'empreinte "
+#~ "digitale de toute personne se servant de l'écran tactile?"
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.it-diff.html 28 Feb 2019 22:00:39 -0000 1.66
+++ proprietary.it-diff.html 4 Mar 2019 08:00:38 -0000 1.67
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -184,6 +184,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -251,14 +270,6 @@
firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
-
- <li id="M201902200">
- <p>Some portable surveillance
- devices (“phones”) now have <a
-
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g">
- fingerprint sensors in the display</a>. Does that imply they could
- take the fingerprint of anyone who operates the touch screen?</p>
- </li>
</ul></em></ins></span>
@@ -319,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.it.po 28 Feb 2019 22:00:39 -0000 1.105
+++ proprietary.it.po 4 Mar 2019 08:00:38 -0000 1.106
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -517,15 +538,6 @@
"Or, as a last resort, you can replace your TV with another model."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.ja-diff.html 28 Feb 2019 22:00:39 -0000 1.67
+++ proprietary.ja-diff.html 4 Mar 2019 08:00:38 -0000 1.68
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -157,10 +157,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -181,6 +181,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -248,14 +267,6 @@
firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
-
- <li id="M201902200">
- <p>Some portable surveillance
- devices (“phones”) now have <a
-
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g">
- fingerprint sensors in the display</a>. Does that imply they could
- take the fingerprint of anyone who operates the touch screen?</p>
- </li>
</ul></em></ins></span>
@@ -316,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary.ja.po 28 Feb 2019 22:00:39 -0000 1.88
+++ proprietary.ja.po 4 Mar 2019 08:00:38 -0000 1.89
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -437,15 +458,6 @@
"Or, as a last resort, you can replace your TV with another model."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.nl-diff.html 28 Feb 2019 22:00:39 -0000 1.66
+++ proprietary.nl-diff.html 4 Mar 2019 08:00:38 -0000 1.67
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -184,6 +184,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -251,14 +270,6 @@
firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
-
- <li id="M201902200">
- <p>Some portable surveillance
- devices (“phones”) now have <a
-
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g">
- fingerprint sensors in the display</a>. Does that imply they could
- take the fingerprint of anyone who operates the touch screen?</p>
- </li>
</ul></em></ins></span>
@@ -319,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.nl.po 28 Feb 2019 22:00:39 -0000 1.77
+++ proprietary.nl.po 4 Mar 2019 08:00:38 -0000 1.78
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -510,15 +531,6 @@
"Or, as a last resort, you can replace your TV with another model."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary.pl-diff.html 28 Feb 2019 22:00:39 -0000 1.84
+++ proprietary.pl-diff.html 4 Mar 2019 08:00:38 -0000 1.85
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
-instances of malicious functionalities (with more than 400 references to
+<p>As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -132,12 +132,12 @@
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -249,14 +268,6 @@
firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
-
- <li id="M201902200">
- <p>Some portable surveillance
- devices (“phones”) now have <a
-
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g">
- fingerprint sensors in the display</a>. Does that imply they could
- take the fingerprint of anyone who operates the touch screen?</p>
- </li>
</ul></em></ins></span>
@@ -317,7 +328,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.pl.po 28 Feb 2019 22:00:39 -0000 1.72
+++ proprietary.pl.po 4 Mar 2019 08:00:38 -0000 1.73
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -592,15 +613,6 @@
"Or, as a last resort, you can replace your TV with another model."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.pot 28 Feb 2019 22:00:39 -0000 1.69
+++ proprietary.pot 4 Mar 2019 08:00:38 -0000 1.70
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a "
+"href=\"https://www.appcensus.mobi\"> how Android apps use and misuse users' "
+"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
+"which 24,000 (31%) transmit the <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201812290\"> Advertising "
+"ID</a> to other companies, and <a "
+"href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> "
+"18,000 (23% of the total) link this ID to hardware identifiers</a>, so that "
+"users cannot escape tracking by resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a "
"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\"> "
@@ -327,14 +349,6 @@
"servers. Or, as a last resort, you can replace your TV with another model."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a "
-"href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\">
"
-"fingerprint sensors in the display</a>. Does that imply they could take the "
-"fingerprint of anyone who operates the touch screen?"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary.pt-br.po 28 Feb 2019 22:00:39 -0000 1.98
+++ proprietary.pt-br.po 4 Mar 2019 08:00:38 -0000 1.99
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2019-02-24 15:49-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -405,20 +426,6 @@
"livre), e configurar um firewall para bloquear conexões com os servidores da
"
"Vizio. Ou, como último recurso, você pode substituir sua TV por outro
modelo."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-"Alguns dispositivos portáteis de vigilância (âtelefonesâ) agora têm <a
href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> sensores de "
-"impressão digital na tela</a>. Isso significa que eles poderia coletar a "
-"impressão digital de qualquer um que opera a tela de toque?"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -494,6 +501,20 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Some portable surveillance devices (“phones”) now have <a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "fingerprint sensors in the display</a>. Does that imply they could take "
+#~ "the fingerprint of anyone who operates the touch screen?"
+#~ msgstr ""
+#~ "Alguns dispositivos portáteis de vigilância (âtelefonesâ) agora têm
<a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "sensores de impressão digital na tela</a>. Isso significa que eles "
+#~ "poderia coletar a impressão digital de qualquer um que opera a tela de "
+#~ "toque?"
+
+#~ msgid ""
#~ "Twenty nine “beauty camera” apps that used to be on Google "
#~ "Play had one or more malicious functionalities, such as stealing users' "
#~ "photos instead of “beautifying” them, <a href=\"https://www."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.ru.po 1 Mar 2019 05:29:26 -0000 1.167
+++ proprietary.ru.po 4 Mar 2019 08:00:38 -0000 1.168
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -428,20 +450,6 @@
"и наÑÑÑойÑÑ Ð±ÑандмаÑÑÑ, ÑÑÐ¾Ð±Ñ ÑоединениÑ
Ñ ÑеÑвеÑами Vizio блокиÑовалиÑÑ. "
"Ðли, в кÑайнем ÑлÑÑае, можно замениÑÑ Ñвой
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð½Ð° дÑÑгÑÑ Ð¼Ð¾Ð´ÐµÐ»Ñ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-"РнекоÑоÑÑÑ
поÑÑаÑивнÑÑ
ÑÑÑÑойÑÑваÑ
Ñлежки (“ÑелеÑонаÑ
”) ÑепеÑÑ "
-"еÑÑÑ <a
href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-"
-"galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
-"даÑÑики оÑпеÑаÑков палÑÑев на ÑкÑане</a>.
ÐодÑазÑÐ¼ÐµÐ²Ð°ÐµÑ Ð»Ð¸ ÑÑо, ÑÑо они "
-"могли Ð±Ñ ÑнимаÑÑ Ð¾ÑпеÑаÑки вÑеÑ
, кÑо
ÑабоÑÐ°ÐµÑ Ñ ÑенÑоÑнÑм ÑкÑаном?"
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -521,6 +529,19 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Some portable surveillance devices (“phones”) now have <a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "fingerprint sensors in the display</a>. Does that imply they could take "
+#~ "the fingerprint of anyone who operates the touch screen?"
+#~ msgstr ""
+#~ "РнекоÑоÑÑÑ
поÑÑаÑивнÑÑ
ÑÑÑÑойÑÑваÑ
Ñлежки (“ÑелеÑонаÑ
”) "
+#~ "ÑепеÑÑ ÐµÑÑÑ <a
href=\"https://www.theguardian.com/technology/2019/feb/20/"
+#~ "samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-"
+#~ "and-5g\"> даÑÑики оÑпеÑаÑков палÑÑев на
ÑкÑане</a>. ÐодÑазÑÐ¼ÐµÐ²Ð°ÐµÑ Ð»Ð¸ ÑÑо, "
+#~ "ÑÑо они могли Ð±Ñ ÑнимаÑÑ Ð¾ÑпеÑаÑки вÑеÑ
,
кÑо ÑабоÑÐ°ÐµÑ Ñ ÑенÑоÑнÑм ÑкÑаном?"
+
+#~ msgid ""
#~ "Twenty nine “beauty camera” apps that used to be on Google "
#~ "Play had one or more malicious functionalities, such as stealing users' "
#~ "photos instead of “beautifying” them, <a href=\"https://www."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary.zh-tw-diff.html 28 Feb 2019 22:00:39 -0000 1.44
+++ proprietary.zh-tw-diff.html 4 Mar 2019 08:00:38 -0000 1.45
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -101,17 +101,17 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
@@ -125,9 +125,9 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
@@ -185,6 +185,25 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
<li id="M201902230">
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
@@ -252,14 +271,6 @@
firewall to block connections to Vizio's servers. Or, as a last resort,
you can replace your TV with another model.</p>
</li>
-
- <li id="M201902200">
- <p>Some portable surveillance
- devices (“phones”) now have <a
-
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g">
- fingerprint sensors in the display</a>. Does that imply they could
- take the fingerprint of anyone who operates the touch screen?</p>
- </li>
</ul></em></ins></span>
@@ -320,7 +331,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.zh-tw.po 28 Feb 2019 22:00:39 -0000 1.55
+++ proprietary.zh-tw.po 4 Mar 2019 08:00:38 -0000 1.56
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook offered a convenient proprietary library for building mobile apps, "
"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-"
"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -426,15 +447,6 @@
"Or, as a last resort, you can replace your TV with another model."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (“phones”) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- pt-br.po 28 Feb 2019 22:00:39 -0000 1.53
+++ pt-br.po 4 Mar 2019 08:00:38 -0000 1.54
@@ -4149,6 +4149,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- ru.po 1 Mar 2019 05:59:20 -0000 1.88
+++ ru.po 4 Mar 2019 08:00:38 -0000 1.89
@@ -5746,6 +5746,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- zh-tw.po 28 Feb 2019 22:00:39 -0000 1.39
+++ zh-tw.po 4 Mar 2019 08:00:38 -0000 1.40
@@ -3985,6 +3985,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus."
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus."
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/26
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/28