[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Tue, 26 Mar 2019 06:33:51 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/03/26 06:33:49
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.394&r2=1.395
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.491&r2=1.492
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.52&r2=1.53
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- de.po 23 Mar 2019 10:31:40 -0000 1.52
+++ de.po 26 Mar 2019 10:33:48 -0000 1.53
@@ -5402,6 +5402,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- es.po 23 Mar 2019 10:31:40 -0000 1.69
+++ es.po 26 Mar 2019 10:33:48 -0000 1.70
@@ -3948,6 +3948,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- fr.po 23 Mar 2019 10:52:11 -0000 1.92
+++ fr.po 26 Mar 2019 10:33:48 -0000 1.93
@@ -4396,6 +4396,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- it.po 23 Mar 2019 10:31:41 -0000 1.52
+++ it.po 26 Mar 2019 10:33:48 -0000 1.53
@@ -5063,6 +5063,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- ja.po 23 Mar 2019 10:31:41 -0000 1.52
+++ ja.po 26 Mar 2019 10:33:48 -0000 1.53
@@ -4366,6 +4366,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-google.de-diff.html 17 Mar 2019 10:32:40 -0000 1.22
+++ malware-google.de-diff.html 26 Mar 2019 10:33:48 -0000 1.23
@@ -322,8 +322,8 @@
let Google monitor their phone use, and all internet use</em></ins></span>
in <span class="removed"><del><strong>popular Android
apps</strong></del></span> <span class="inserted"><ins><em>their
homes, for an extravagant payment of $20</a>.</p>
- <p>This is not a malicious functionality of a program with some other
- purpose; this</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>the software's sole purpose,</em></ins></span> and
+ <p>This</em></ins></span> is <span
class="removed"><del><strong>pervasive</strong></del></span> <span
class="inserted"><ins><em>not a malicious functionality of a program with some
other
+ purpose; this is the software's sole purpose,</em></ins></span> and
<span class="removed"><del><strong>sometimes very clever. Some trackers
can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow</strong></del></span> <span class="inserted"><ins><em>Google says
so. But
@@ -353,34 +353,56 @@
<li><p>Google Chrome contains a key logger
that</strong></del></span> <span
class="inserted"><ins><em>card</a>.</p>
</li>
- <li id="M201609210">
- <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software</em></ins></span> Google <span
class="removed"><del><strong>every URL typed in</a>, one
key</strong></del></span> <span class="inserted"><ins><em>uses to spy on
students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to <a
href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives</em></ins></span> at <span
class="inserted"><ins><em>the School Board to refuse the
+ budget unless the school initiates</em></ins></span> a <span
class="removed"><del><strong>time.</p></strong></del></span> <span
class="inserted"><ins><em>switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free software.</p>
+ </li>
+
+ <li id="M201609210">
+ <p>Google's new voice messaging app <a
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></em></ins></span>
</li>
- <li id="M201609140">
+ <span
class="removed"><del><strong><li><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609140">
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
- <p>Even if you disable</em></ins></span> Google <span
class="removed"><del><strong>every URL typed in</a>, one key
at</strong></del></span> <span class="inserted"><ins><em>Maps and location
tracking, you must
+ <p>Even if you disable Google Maps and location tracking, you must
disable Google Play itself to completely stop the tracking. This is
yet another example of nonfree software pretending to obey the user,
- when it's actually doing something else. Such</em></ins></span> a <span
class="removed"><del><strong>time.</p></strong></del></span> <span
class="inserted"><ins><em>thing would be almost
+ when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
<li id="M201507280">
<p>Google Chrome makes it easy for an extension to do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on the user's browsing</a>, and many of them do
so.</p></em></ins></span>
+ snooping on the user's browsing</a>, and many of them do
so.</p>
</li>
- <span
class="removed"><del><strong><li><p>Google</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506180">
+ <li id="M201506180">
<p>Google</em></ins></span> Chrome includes a module that <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
activates microphones and transmits audio to its
servers</a>.</p>
@@ -577,7 +599,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:40 $
+$Date: 2019/03/26 10:33:48 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-google.de.po 17 Mar 2019 10:32:40 -0000 1.37
+++ malware-google.de.po 26 Mar 2019 10:33:48 -0000 1.38
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -678,6 +678,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-google.es.po 18 Mar 2019 09:57:23 -0000 1.3
+++ malware-google.es.po 26 Mar 2019 10:33:48 -0000 1.4
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
"PO-Revision-Date: 2019-03-18 10:49+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -542,6 +543,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-google.fr.po 17 Mar 2019 16:01:34 -0000 1.59
+++ malware-google.fr.po 26 Mar 2019 10:33:48 -0000 1.60
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
"PO-Revision-Date: 2019-03-17 17:00+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:26+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -544,6 +545,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-google.pot 17 Mar 2019 10:32:40 -0000 1.33
+++ malware-google.pot 26 Mar 2019 10:33:48 -0000 1.34
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -383,6 +383,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a "
+"href=\"https://www.eff.org/wp/school-issued-devices-and-student-privacy\"> "
+"collecting far more data on students than is necessary, and store it "
+"indefinitely</a>. Parents and students complain about the lack of "
+"transparency on the part of both the educational services and the schools, "
+"the difficulty of opting out of these services, and the lack of proper "
+"privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a "
"href=\"http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs
"
"all conversations</a>."
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-google.ru.po 18 Mar 2019 06:31:56 -0000 1.79
+++ malware-google.ru.po 26 Mar 2019 10:33:48 -0000 1.80
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
"PO-Revision-Date: 2018-10-05 09:03+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:26+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -542,6 +543,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- nl.po 23 Mar 2019 10:31:41 -0000 1.52
+++ nl.po 26 Mar 2019 10:33:48 -0000 1.53
@@ -3597,6 +3597,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- pl.po 23 Mar 2019 10:31:41 -0000 1.52
+++ pl.po 26 Mar 2019 10:33:48 -0000 1.53
@@ -3110,6 +3110,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- pot 23 Mar 2019 10:31:41 -0000 1.52
+++ pot 26 Mar 2019 10:33:48 -0000 1.53
@@ -2946,6 +2946,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-surveillance.de-diff.html 17 Mar 2019 10:32:41 -0000
1.55
+++ proprietary-surveillance.de-diff.html 26 Mar 2019 10:33:48 -0000
1.56
@@ -706,7 +706,7 @@
requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span>
+ <dd>Injects JavaScript code into</strong></del></span>
<span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
@@ -947,181 +947,101 @@
<p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
- users. The stated purpose</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots</em></ins></span> of <span
class="inserted"><ins><em>companies built apps that
- way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>JS injection is</strong></del></span>
<span class="inserted"><ins><em>personal
- data they collected would go</em></ins></span> to <span
class="removed"><del><strong>display
- ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span class="inserted"><ins><em>Facebook as
well.</p>
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
<li id="M201902140">
<p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>.
As</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>March 2019, nearly
- 78,000</em></ins></span> have
- <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>been
analyzed,</em></ins></span> of <span class="inserted"><ins><em>which 24,000
(31%) transmit</em></ins></span> the <span class="removed"><del><strong>app does
- JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl>
-</li>
-<li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span> <span
class="inserted"><ins><em><a
+ Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape</em></ins></span> tracking <span
class="removed"><del><strong>libraries. For
- the paid proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>by resetting it.</p>
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed,</em></ins></span> was <span
class="removed"><del><strong>only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most</strong></del></span> <span class="inserted"><ins><em>in no hurry
to take action. This proves
- that the policies</em></ins></span> of <span
class="removed"><del><strong>them</strong></del></span> <span
class="inserted"><ins><em>a development platform</em></ins></span> are <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>ineffective at
- preventing nonfree software developers from including
malware</em></ins></span> in <span class="removed"><del><strong>fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span>
- <span class="inserted"><ins><em>their programs.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
- <p>Apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902060">
- <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>BART</strong></del></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902041.1">
- <p>Twenty nine “beauty camera”</em></ins></span> apps
that <span class="removed"><del><strong>track users by</strong></del></span>
<span class="inserted"><ins><em>used to
- be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
+ </li>
+
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them</em></ins></span> to <span
class="removed"><del><strong>ultrasound</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,
+ them to phishing sites that stole their credentials. Furthermore,
the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away</em></ins></span> from <span
class="removed"><del><strong>beacons placed</strong></del></span> <span
class="inserted"><ins><em>nonfree apps</em></ins></span> in <span
class="removed"><del><strong>stores or played by TV programs</a>.
- </p></strong></del></span>
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
- there is no easy way of knowing what they really
do.</p></em></ins></span>
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation</em></ins></span> of <span
class="removed"><del><strong>Android</strong></del></span> <span
class="inserted"><ins><em>the 150 most popular
- gratis VPN</em></ins></span> apps <span class="removed"><del><strong>can
collude</strong></del></span> <span class="inserted"><ins><em>in Google Play
found that <a
+ <li id="M201902010">
+ <p>An investigation of the 150 most popular
+ gratis VPN apps in Google Play found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
- data</strong></del></span> <span class="inserted"><ins><em>protect
their usersâ privacy</a> due</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
potentially also be used to spy on users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had</em></ins></span> found
- <span class="removed"><del><strong>tens of thousands of
pairs</strong></del></span> that <span
class="removed"><del><strong>collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers</strong></del></span>
<a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>users that install the
app</a>.</p>
-
-<p>Merely asking</strong></del></span>
- the <span class="removed"><del><strong>“consent” of users is
not enough
-to legitimize actions like this. At this point, most
users</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps</em></ins></span> have
-<span class="removed"><del><strong>stopped reading the “Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>lousy
privacy policies</a>.</p>
-
- <p>It is unfortunate</em></ins></span> that <span
class="removed"><del><strong>spell out
-what</strong></del></span> <span class="inserted"><ins><em>these articles talk
about “free
- apps.” These apps are gratis, but</em></ins></span> they are <span
class="removed"><del><strong>“consenting” to. Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!</p></strong></del></span> <span
class="inserted"><ins><em><em>not</em> <a
- href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
+
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
- <p>Even if you disable Google Maps and location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>locations</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The
company</em></ins></span> is
- <span class="removed"><del><strong>yet another
example</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding that it notify the
users</em></ins></span> of <span class="removed"><del><strong>nonfree software
pretending to obey</strong></del></span> <span class="inserted"><ins><em>what
it will do
- with</em></ins></span> the <span class="removed"><del><strong>user,
- when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
- unthinkable</strong></del></span> <span class="inserted"><ins><em>side
issue. What the company does</em></ins></span>
- with <span class="removed"><del><strong>free
software.</p></strong></del></span> <span class="inserted"><ins><em>the
data is a secondary issue. The principal wrong here is that
+ <p>I think that lawsuit is about a side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>More than
73%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>gratis</em></ins></span> Android apps <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ tracking people's locations.</p>
</li>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found</strong></del></span> <span class="inserted"><ins><em>machine's
“advertising ID,” so that
+ <p>Often they send the machine's “advertising ID,” so
that
Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way
to</strong></del></span> <span class="inserted"><ins><em>app; others
only</em></ins></span> say
- <span class="removed"><del><strong>“zero price” is
“gratis.”</p>
-
- <p>The article takes for granted</strong></del></span> that the <span
class="removed"><del><strong>usual analytics tools are
- legitimate,</strong></del></span> <span class="inserted"><ins><em>user is
- using that app,</em></ins></span> but <span class="inserted"><ins><em>that
alone</em></ins></span> is <span class="inserted"><ins><em>often quite
informative.</p>
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
account.</p>
@@ -1130,227 +1050,149 @@
<li id="M201810244">
<p>Some Android apps <a
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers</strong></del></span>
have <span class="removed"><del><strong>no right to
- analyze what</strong></del></span> <span class="inserted"><ins><em>deleted
them</a>.</p>
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
<p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>are doing or how. “Analytics” tools
that snoop are
- just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>disable “location
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
+ <p>There are other ways to turn off the other kinds of location
tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
- on</strong></del></span> <span class="inserted"><ins><em>listens
through</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>present in some
Android devices when they are sold.
- Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span> <span
class="inserted"><ins><em>save
+ <p>I expect it implements DRM, too—that there is no way to save
a recording. But I can't be sure from the article.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>care much less about sports, you will benefit
in
- many ways. This is one more.</p></em></ins></span>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
- </li>
-
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>any file
on</strong></del></span> <span class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>system.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
+ <li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and <span
class="inserted"><ins><em>freedom, Android users
- need to get rid of</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make
it</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>study how iOS cr...apps spy on
users</a>, because this
- would require circumventing the iOS DRM.</p>
- </li>
-
- <li><p>In the latest iThings system, “turning off”
WiFi</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,</em></ins></span>
- and <span class="removed"><del><strong>Bluetooth</strong></del></span> the
- <span class="removed"><del><strong>obvious way</strong></del></span>
<span class="inserted"><ins><em>proprietary apps by getting apps from the free
software
- only</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an app contains
anti-features</a>.</p></em></ins></span>
+ the user if an app contains anti-features</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- —</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"></em></ins></span>
- which <span class="removed"><del><strong>would mean no
way</strong></del></span> <span class="inserted"><ins><em>users are
HIV-positive, then provides the information</em></ins></span> to <span
class="removed"><del><strong>use it without having your fingerprints
- taken. Users would</strong></del></span>
- <span class="inserted"><ins><em>companies</a>.</p>
+ <li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
- <p>Grindr should not</em></ins></span> have <span
class="removed"><del><strong>no way</strong></del></span> <span
class="inserted"><ins><em>so much information about its users.
+ <p>Grindr should not have so much information about its users.
It could be designed so that users communicate such info to each
- other but not</em></ins></span> to <span class="removed"><del><strong>tell
whether</strong></del></span> the <span class="removed"><del><strong>phone is
snooping</strong></del></span> <span class="inserted"><ins><em>server's
database.</p>
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
<p>The moviepass app and dis-service
- spy</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
-
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected.
It</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots of personal data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
<p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers</em></ins></span> can
- <span class="removed"><del><strong>get them from
there.</p></strong></del></span> <span class="inserted"><ins><em><a
+ is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></em></ins></span>
+ networks</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all</em></ins></span> phone <span
class="removed"><del><strong>number</strong></del></span> <span
class="inserted"><ins><em>numbers and email addresses</a> in user's
address
- book to developer's server. Note</em></ins></span> that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>user types into it</a>; the server records
these numbers for at least 30
- days.</p></strong></del></span> <span
class="inserted"><ins><em>words
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></em></ins></span>
+ referring to zero price.</p>
</li>
- <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID</strong></del></span>
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>install even gratis apps)</a>
- without giving a valid email address</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
-
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>deleted these apps after
+ <p>Google did not intend to make these apps spy;
on</em></ins></span> the <span class="removed"><del><strong>HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
+ worked in various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>code Apple
- sends to it.</p>
- </li>
-
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
+ for</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
- <p>On</em></ins></span> the <span class="removed"><del><strong>most
popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>other
hand, Google redistributes nonfree Android apps,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span>
- <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of their <span
class="removed"><del><strong>users with third parties.</p>
- </li>
+ <p>On</em></ins></span> the <span class="removed"><del><strong>JS
injection is to display
+ ads. Uses roughly 5 tracking libraries. Also, it redirects the
+ user's traffic through valueclick.com (an advertising
+ website).</dd>
- <li><p>iThings automatically upload to Apple's servers all the
photos and
- videos they make.</p>
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
+ roughly 5 tracking libraries. Developers</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
+ <p>Could Google</em></ins></span> have
+ <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a></strong></del></span> <span
class="inserted"><ins><em>being
- nonfree. It also distributes its own nonfree apps, such</em></ins></span>
as <span class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud
feature is</strong></del></span> <span class="inserted"><ins><em>Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by the
- startup</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>app does
+ JavaScript injection</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> for <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl>
+</li>
+<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A</strong></del></span>
study
+ <span class="inserted"><ins><em>the source code somehow to determine
whether they mistreat users</em></ins></span> in <span
class="removed"><del><strong>2015</a> found that 90%</strong></del></span>
+ <span class="inserted"><ins><em>various ways. If it did a good
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or
less
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>app developers are
clever
+ enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>paid proprietary</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
- <p>Could Google have done a better job</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
+ <p>But since Google itself develops malicious</em></ins></span>
apps, <span class="removed"><del><strong>it was only 60%.</p>
- <p>There</strong></del></span> <span
class="inserted"><ins><em>preventing apps from
- cheating? There</em></ins></span> is <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
- to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>inspect executable
proprietary apps to see what they do.</p>
-
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If</em></ins></span> it <span
class="removed"><del><strong>still counts as</strong></del></span> <span
class="inserted"><ins><em>did</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>good job</em></ins></span> of <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</em></ins></span> to
- <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release</em></ins></span>
of <span class="removed"><del><strong>many celebrities</a>. They needed
to break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>source
code</em></ins></span> to <span class="removed"><del><strong>get at them, but
NSA</strong></del></span> <span class="inserted"><ins><em>the
- public, so we</em></ins></span> can <span
class="removed"><del><strong>access any of them through</strong></del></span>
<span class="inserted"><ins><em>depend on each other.</p>
+ <p>The article confusingly describes gratis apps as “free”,
+ but most of them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>we cannot
trust
+ Google to protect us. We must demand release of source code
to</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
</li>
- <li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li><p>Spyware in iThings:
- the</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201705230"></em></ins></span>
+ <p>Apps for BART <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
+ snoop</em></ins></span> on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
@@ -1358,376 +1200,371 @@
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in</em></ins></span> stores <span
class="removed"><del><strong>determine exactly where the iThing is,
- and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>or played by TV
- programs</a>.</p></em></ins></span>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
+ </p></strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>track users, which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span class="inserted"><ins><em><a
+ <li id="M201704260">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</em></ins></span> it
- <span class="removed"><del><strong>is still true</strong></del></span>
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in
<span class="removed"><del><strong>iOS 7.)</p></strong></del></span>
<span class="inserted"><ins><em>the
device</a>.</p></em></ins></span>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for</em></ins></span> its <span
class="removed"><del><strong>geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>this was done without the users' consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should</em></ins></span> be
- <span class="removed"><del><strong>turned off.</p>
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
- <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>flat out</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074"></em></ins></span>
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
+
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ study found tens of thousands of pairs that collude</a>.</p>
</li>
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design</em></ins></span>
- the <span class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>app to</em></ins></span> snoop <span
class="removed"><del><strong>on all the data in an iThing,
- or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>at all</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs</em></ins></span> of <span class="removed"><del><strong>iOS
seem to exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-</ul>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201703300">
+ <p>Verizon</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users that install the app</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
-</div>
+<p>Merely asking the “consent” of users is not enough
+to legitimize actions like this. At this point, most users have
+stopped reading the “Terms and Conditions”</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information</strong></del></span> it <span
class="removed"><del><strong>collects</strong></del></span> <span
class="inserted"><ins><em>will</a> pre-install</em></ins></span>
+ on <span class="removed"><del><strong>users, instead
+of hiding it in an obscurely worded EULA.</p>
-<ul>
- <li><p>Tracking software in popular</strong></del></span>
Android apps <span class="removed"><del><strong>is pervasive and
- sometimes very clever. Some trackers</strong></del></span> can <span
class="inserted"><ins><em>collude
- to transmit users' personal data to servers.</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens of thousands of pairs that
collude</a>.</p></em></ins></span>
- </li>
+<p>However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!</p>
+</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google</strong></del></span>
+ <li>
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks</strong></del></span> <span class="inserted"><ins><em>some of its
phones. The app will give Verizon the same information
+ about</em></ins></span> the users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
- <span class="inserted"><ins><em><li id="M201703300">
- <p>Verizon</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off,
even</strong></del></span>
- <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets</em></ins></span> when
<span class="inserted"><ins><em>they use
+ <p>Even if you disable</strong></del></span> <span
class="inserted"><ins><em>searches that</em></ins></span> Google <span
class="removed"><del><strong>Maps</strong></del></span> <span
class="inserted"><ins><em>normally gets when they use
its search engine.</p>
- <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
- explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece</em></ins></span> of
<span class="inserted"><ins><em>spyware is
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>,</em></ins></span> and
<span class="removed"><del><strong>location tracking, you</strong></del></span>
<span class="inserted"><ins><em>the user</em></ins></span> must
+ <span class="removed"><del><strong>disable Google Play itself to
completely stop</strong></del></span>
+ <span class="inserted"><ins><em>explicitly opt-in before</em></ins></span>
the <span class="removed"><del><strong>tracking. This is
+ yet another example</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However, the app
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According to Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
+ user data</em></ins></span> to <span class="removed"><del><strong>obey the
user,
+ when it's actually doing something else. Such</strong></del></span> a
<span class="removed"><del><strong>thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>Chinese company</a>.</p></em></ins></span>
</li>
- <li id="M201611280">
- <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages which enable them to turn the phones
- on</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611280">
+ <p>The Uber app tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</em></ins></span> and <span
class="removed"><del><strong>off, listen to the microphone, retrieve
geo-location data from</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the
- <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ movements before</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,” unrelated
to</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+
+ <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
- <p>This example illustrates how “getting</em></ins></span> the
<span class="removed"><del><strong>contact list. This
malware</strong></del></span> <span class="inserted"><ins><em>user's
- consent” for surveillance</em></ins></span> is <span
class="removed"><del><strong>designed to
- disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>inadequate as a protection against
+ <p>The article should not have described these apps as
+ “free”—they are not free software. The clear way to say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>user's
+ consent”</em></ins></span> for <span
class="removed"><del><strong>granted that the usual analytics tools are
+ legitimate, but</strong></del></span> <span
class="inserted"><ins><em>surveillance</em></ins></span> is <span
class="removed"><del><strong>that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong</strong></del></span> <span
class="inserted"><ins><em>inadequate</em></ins></span> as <span
class="removed"><del><strong>any other
snooping.</p></strong></del></span> <span class="inserted"><ins><em>a
protection against
massive surveillance.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
+ <span class="removed"><del><strong><li><p>Gratis Android apps
(but not <a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100</strong></del></span>
<span class="inserted"><ins><em><li id="M201611160">
- <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
+ <p>A</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a></em></ins></span> that <span
class="removed"><del><strong>users can't
delete</a>,</strong></del></span> <span
class="inserted"><ins><em>investigated the privacy</em></ins></span> and <span
class="removed"><del><strong>they send so much data</strong></del></span> <span
class="inserted"><ins><em>security of
- 283 Android VPN apps concluded</em></ins></span> that <span
class="removed"><del><strong>their transmission is a
- substantial expense</strong></del></span> <span
class="inserted"><ins><em>“in spite of the promises</em></ins></span>
- for <span class="removed"><del><strong>users. Said transmission, not
wanted or
- requested</strong></del></span> <span class="inserted"><ins><em>privacy,
security, and anonymity given</em></ins></span> by the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>majority</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
+ research paper</a> that investigated the privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
+ for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>anonymity given
by</em></ins></span> the <span class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present in some Android devices when they are
sold.
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span> <span
class="inserted"><ins><em>majority of VPN
+ apps—millions of users may be unawarely subject</em></ins></span> to
<span class="removed"><del><strong>Motorola</a>.</p>
+ </li>
+
+ <li><p>Some manufacturers add</strong></del></span> <span
class="inserted"><ins><em>poor security
+ guarantees and abusive practices inflicted by VPN apps.”</p>
+
+ <p>Following is</em></ins></span> a
+ <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
+ privacy:</p>
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ <dl class="compact">
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries</em></ins></span> such as <span
class="removed"><del><strong>Carrier IQ.</a></p>
</li>
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>VPN
- apps—millions of users may be unawarely subject to poor security
- guarantees and abusive practices inflicted</em></ins></span> by <span
class="inserted"><ins><em>VPN apps.”</p>
-
- <p>Following is</em></ins></span> a <span
class="removed"><del><strong>paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the
<span class="removed"><del><strong>GPS and microphone in Android
- phones</strong></del></span> <span class="inserted"><ins><em>research
paper,
- of some proprietary VPN apps that track users</em></ins></span> and <span
class="removed"><del><strong>laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send</strong></del></span>
<span class="inserted"><ins><em>infringe</em></ins></span> their <span
class="removed"><del><strong>GPS location on
- remote command</strong></del></span>
- <span class="inserted"><ins><em>privacy:</p>
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the
system.</p>
+ </li>
+</ul>
- <dl class="compact">
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX</em></ins></span>
and <span class="inserted"><ins><em>Appflood,
- meant to track</em></ins></span> users <span
class="removed"><del><strong>cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says</strong></del></span> <span class="inserted"><ins><em>and
show them targeted ads.</dd>
+
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>NativeX and Appflood,
+ meant</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="inserted"><ins><em>show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>will eventually require all new portable
phones</strong></del></span> <span class="inserted"><ins><em>has full access to
users'
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong><a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span class="inserted"><ins><em>has full
access</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because this
+ would require circumventing the iOS DRM.</p>
+ </li>
+
+ <li><p>In the latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>users'
text messages.</dd>
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code> permission to
read logs
+ <dt>DroidVPN</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>TigerVPN</dt>
+ <dd>Requests</em></ins></span> the
+ <span class="removed"><del><strong>obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em><code>READ_LOGS</code>
permission</em></ins></span> to <span class="removed"><del><strong>be spied
on”.</p>
+ </li>
+
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way</strong></del></span> <span
class="inserted"><ins><em>read logs
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
- may turn them over</em></ins></span> to <span
class="removed"><del><strong>have GPS.)</p>
- </li>
+ <dd>Sends traffic</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>LinkedIn. Also,</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>stores detailed logs and
+ may turn them over</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> the <span
class="removed"><del><strong>phone is snooping on
+ them.</p></li>
- <li><p>The nonfree Snapchat app's principal purpose
is</strong></del></span> <span class="inserted"><ins><em>the UK government if
requested.</dd>
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal data</strong></del></span> <span
class="inserted"><ins><em>UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> the <span
class="removed"><del><strong>use</strong></del></span>
- <span class="inserted"><ins><em>users. The stated
purpose</em></ins></span> of <span class="removed"><del><strong>data
on</strong></del></span> the <span class="removed"><del><strong>user's
computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries</strong></del></span> <span class="inserted"><ins><em>JS
injection is</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
- roughly five tracking libraries. Also, it redirects</em></ins></span>
the user's <span class="removed"><del><strong>list</strong></del></span>
- <span class="inserted"><ins><em>traffic through valueclick.com (an
advertising website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers</em></ins></span> of <span
class="removed"><del><strong>other people's phone
- numbers.</a></p>
+ <dd>Injects JavaScript code into the HTML pages
returned</em></ins></span> to <span class="removed"><del><strong>Apple's
servers</a>. Big Brother can
+ get them from there.</p>
</li>
-</ul>
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that</strong></del></span> the <span
class="removed"><del><strong>user types into it</a>;</strong></del></span>
+ <span class="inserted"><ins><em>users. The stated purpose
of</em></ins></span> the <span class="removed"><del><strong>server records
these numbers for at least 30
+ days.</p>
+ </li>
-<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
-</div>
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>JS injection is</em></ins></span> to <span
class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>display ads. Uses
+ roughly five tracking libraries. Also, it redirects</em></ins></span>
the <span class="inserted"><ins><em>user's
+ traffic through valueclick.com (an advertising website).</dd>
-<ul>
- <li>
- <p>The moviepass</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> app <span
class="inserted"><ins><em>have confirmed that
- the non-premium version of the app does JavaScript injection for
- tracking the user</em></ins></span> and <span
class="removed"><del><strong>dis-service spy on users even more than users
- expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going to a movie</a>.
- </p>
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript</em></ins></span> code <span
class="removed"><del><strong>Apple
+ sends to it.</p>
+ </li>
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span
class="inserted"><ins><em>displaying ads.</dd>
- </dl></em></ins></span>
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>into HTML pages, and also uses roughly
+ five tracking libraries. Developers</em></ins></span> of <span
class="inserted"><ins><em>this app have confirmed that</em></ins></span>
+ the <span class="removed"><del><strong>most popular iOS apps
+ <a class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>non-premium version</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
</li>
- <span class="removed"><del><strong><li><p>AI-powered driving
apps can</strong></del></span>
+ <li><p>iThings automatically upload to Apple's servers
all</strong></del></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>app does JavaScript injection for
+ tracking the user</em></ins></span> and
+ <span class="removed"><del><strong>videos they make.</p>
- <span class="inserted"><ins><em><li id="M201609210">
- <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></em></ins></span>
+ <blockquote><p>
+ iCloud</strong></del></span> <span class="inserted"><ins><em>displaying
ads.</dd>
+ </dl>
</li>
- <span class="removed"><del><strong><li><p>The
Sarahah</strong></del></span>
+ <li id="M201609210">
+ <p>Google's new voice messaging app <a
+
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201606050">
- <p>Facebook's new Magic Photo</em></ins></span> app <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
- and <span class="removed"><del><strong>email
addresses</a></strong></del></span> <span
class="inserted"><ins><em>suggests you to share the picture you take according
to who is</em></ins></span>
- in <span class="removed"><del><strong>user's address
- book</strong></del></span> <span class="inserted"><ins><em>the
frame.</p>
+ <li id="M201606050">
+ <p>Facebook's new Magic</em></ins></span> Photo <span
class="removed"><del><strong>Library stores every</strong></del></span> <span
class="inserted"><ins><em>app <a
+
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ scans your mobile phone's</em></ins></span> photo <span
class="inserted"><ins><em>collections for known
faces</a>,</em></ins></span>
+ and <span class="removed"><del><strong>video</strong></del></span> <span
class="inserted"><ins><em>suggests</em></ins></span> you <span
class="removed"><del><strong>take,</strong></del></span> <span
class="inserted"><ins><em>to share the picture you take according to who is
+ in the frame.</p>
- <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note that this article
misuses</strong></del></span> <span class="inserted"><ins><em>require online
access to some
- known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>pictures
are likely to be
- sent across the wire to Facebook's servers and face-recognition
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means the pictures are likely to be
+ sent across the wire to Facebook's servers</em></ins></span> and <span
class="removed"><del><strong>keeps</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them</em></ins></span> to
<span class="removed"><del><strong>zero price.</p></strong></del></span>
<span class="inserted"><ins><em>the service.</p></em></ins></span>
+ even if the user didn't “upload”</em></ins></span> them <span
class="removed"><del><strong>up</strong></del></span> to <span
class="removed"><del><strong>date on</strong></del></span> <span
class="inserted"><ins><em>the service.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605310"></em></ins></span>
- <p>Facebook's app listens all the time, <a
-
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
- advertisements.</p>
- </li>
+ <li id="M201605310">
+ <p>Facebook's app listens</em></ins></span> all <span
class="removed"><del><strong>your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging by
- <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
- </p>
- </li>
+ <p>(From</strong></del></span> <span class="inserted"><ins><em>the
time,</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop</em></ins></span> on <span class="removed"><del><strong>24 Sep
2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
+ <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>what people are listening</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span> <span class="inserted"><ins><em>or watching</a>.
In addition,</em></ins></span>
+ it <span class="removed"><del><strong>still counts as a
+ surveillance functionality.</p>
- <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the
- user must explicitly opt-in before the app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p>
+ <p>Unknown people apparently took advantage of
this</strong></del></span> <span class="inserted"><ins><em>may be analyzing
people's conversations</em></ins></span> to <span
class="inserted"><ins><em>serve them with targeted
+ advertisements.</p>
</li>
- <li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
-
- <li><p>A</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201604250">
- <p>A</em></ins></span> pregnancy test controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <li id="M201604250">
+ <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy</em></ins></span> on many sorts of data in the phone, and in server
accounts,
- it can alter them <span class="removed"><del><strong>too</a>.
+ spy on</em></ins></span> many <span
class="removed"><del><strong>celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>sorts</em></ins></span> of <span
class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
- <li><p>The Uber app tracks</strong></del></span> <span
class="inserted"><ins><em>too</a>.</p>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>iThings:
+ the <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly
where</strong></del></span> the <span class="removed"><del><strong>iThing
is,</strong></del></span> <span
class="inserted"><ins><em>phone,</em></ins></span> and <span
class="removed"><del><strong>get other info
too.</p></strong></del></span> <span class="inserted"><ins><em>in server
accounts,
+ it can alter them too</a>.</p></em></ins></span>
</li>
- <li id="M201601130">
- <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on what radio</em></ins></span> and
<span class="removed"><del><strong>after</strong></del></span> <span
class="inserted"><ins><em>TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+ and Twitter.</p>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601130">
+ <p>Apps that include <a
+
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also on what users post on
various</em></ins></span> sites
+ <span class="inserted"><ins><em>such as Facebook, Google+ and
Twitter.</p>
</li>
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated to</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>app's
functionality, was <a
+ unrelated to the app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span class="removed"><del><strong>user's
consent”</strong></del></span> <span class="inserted"><ins><em>500 most
popular gratis Android apps</a>.</p>
+ found in the 500 most popular gratis Android apps</a>.</p>
<p>The article should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>track users,
which</strong></del></span> <span class="inserted"><ins><em>say “zero
price”</em></ins></span> is
+ <span class="removed"><del><strong><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That</strong></del></span> <span
class="inserted"><ins><em>“gratis.”</p>
- <p>The article takes</em></ins></span> for <span
class="removed"><del><strong>surveillance</strong></del></span> <span
class="inserted"><ins><em>granted that the usual analytics tools are
- legitimate, but</em></ins></span> is <span
class="removed"><del><strong>inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps</strong></del></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software</strong></del></span> <span
class="inserted"><ins><em>valid? Software developers have no right to
+ <p>The</em></ins></span> article <span
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span
class="inserted"><ins><em>takes for granted that the usual analytics tools are
+ legitimate,</em></ins></span> but <span
class="removed"><del><strong>it</strong></del></span> is <span
class="removed"><del><strong>still true in iOS
7.)</p></strong></del></span> <span class="inserted"><ins><em>that valid?
Software developers have no right to
analyze what users are doing or how. “Analytics” tools
- that</em></ins></span> snoop <span class="removed"><del><strong>on what
radio and TV programs</strong></del></span> are <span
class="removed"><del><strong>playing nearby</a>. Also on what users post
on various sites
- such</strong></del></span> <span
class="inserted"><ins><em>just</em></ins></span> as <span
class="removed"><del><strong>Facebook, Google+ and
Twitter.</p></strong></del></span> <span class="inserted"><ins><em>wrong
as any other snooping.</p></em></ins></span>
+ that snoop are just as wrong as any other
snooping.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app
- <a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
<span class="inserted"><ins><em><li id="M201510300">
- <p>More than 73% and 47% of</em></ins></span> mobile <span
class="removed"><del><strong>phone's photo collections for known
faces</a>,</strong></del></span> <span
class="inserted"><ins><em>applications, from Android</em></ins></span> and
<span class="removed"><del><strong>suggests you to share the picture you take
according to who
- is in the frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers</strong></del></span> <span
class="inserted"><ins><em>iOS
- respectively <a href="https://techscience.org/a/2015103001/">share
- personal, behavioral</em></ins></span> and <span
class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>location information</a></em></ins></span> of
<span class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if the user didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>their
users with
+ <p>More than 73% and 47% of mobile applications, from Android and iOS
+ respectively</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share
+ personal, behavioral and location information</a> of their users with
third parties.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Like</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple
can,</strong></del></span>
<span class="inserted"><ins><em><li id="M201508210">
- <p>Like</em></ins></span> most “music screaming”
disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
+ <p>Like most “music screaming” disservices, Spotify is
+ based on proprietary malware (DRM</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>snooping). In August 2015 it</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>,
and</em></ins></span> some <span class="removed"><del><strong>data from iPhones
for</strong></del></span> <span class="inserted"><ins><em>are starting
to realize that it is nasty.</p>
- <p>This article shows the <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"></em></ins></span>
+ <p>This article shows</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example of the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>attitude of the proprietary software industry
+ typical example of</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>attitude of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>proprietary software industry
towards those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
@@ -1736,80 +1573,207 @@
<li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study in 2015</a> found that 90% of the top-ranked gratis proprietary
+ study</em></ins></span> in <span class="removed"><del><strong>an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>2015</a>
found that 90% of the top-ranked gratis proprietary
Android apps contained recognizable tracking libraries. For the paid
- proprietary apps, it was only 60%.</p>
+ proprietary apps,</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them are not in fact <a
+ “free”, but most</em></ins></span> of <span
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span
class="inserted"><ins><em>them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>that
word</em></ins></span>
+ is <span class="removed"><del><strong>the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
- <li id="M201505060">
- <p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+<ul>
+ <li><p>Tracking software in popular</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505060">
+ <p>Gratis</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
+ sometimes very clever. Some trackers can</strong></del></span> <span
class="inserted"><ins><em>(but not</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
+
+ <li><p>Android tracks location for Google</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
+ and advertising</a> URLs, on</em></ins></span> the <span
class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>average.</p>
</li>
<li id="M201504060">
- <p>Widely used <a
-
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
- the phone.</p>
-
- <p>Don't be distracted by the question</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>app developers
- get users to say “I agree”. That is no excuse for
- malware.</p></em></ins></span>
+ <p>Widely used</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
+
+ <li><p>According</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in
addition</em></ins></span> to <span class="removed"><del><strong>Edward Snowden,
+ <a href="http://www.bbc.com/news/uk-34444233">agencies can take
over smartphones</a></strong></del></span>
+ <span class="inserted"><ins><em>the snooping done</em></ins></span> by
<span class="removed"><del><strong>sending hidden text messages which enable
them to turn</strong></del></span> the <span class="removed"><del><strong>phones
+ on</strong></del></span> <span class="inserted"><ins><em>phone
company,</em></ins></span> and <span class="removed"><del><strong>off, listen
to</strong></del></span> <span class="inserted"><ins><em>perhaps
by</em></ins></span> the <span class="removed"><del><strong>microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em>OS in</em></ins></span>
+ the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+
+ <p>Don't be distracted by</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware is designed to
+ disguise itself from investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that</strong></del></span> <span class="inserted"><ins><em>question of whether
the app developers
+ get</em></ins></span> users <span class="removed"><del><strong>can't
delete</a>,
+ and they send so much data that their transmission</strong></del></span>
<span class="inserted"><ins><em>to say “I agree”.
That</em></ins></span> is <span class="removed"><del><strong>a
+ substantial expense</strong></del></span> <span
class="inserted"><ins><em>no excuse</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
+ requested by the user, clearly must constitute spying of some
+ kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens</strong></del></span>
+ <span class="inserted"><ins><em>malware.</p>
+ </li>
+
+ <li id="M201411260">
+ <p>Many proprietary apps</em></ins></span> for <span
class="removed"><del><strong>voice all</strong></del></span> <span
class="inserted"><ins><em>mobile devices
+ report which other apps</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
- <span class="inserted"><ins><em><li id="M201411260">
- <p>Many</em></ins></span> proprietary apps for mobile devices
- report which other apps the user has installed. <a
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
- as bad as what the others do.</p>
+ is doing this</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us by</strong></del></span> a
<span class="removed"><del><strong>paywall)
+ reports</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
+ the FBI can remotely activate the GPS and microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>at least</em></ins></span> is
+ <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>FTC</strong></del></span>
+ <li><p>Portable phones with GPS will send their GPS location on
+ remote command</strong></del></span> <span
class="inserted"><ins><em>visible</em></ins></span> and <span
class="removed"><del><strong>users cannot stop them:</strong></del></span>
<span class="inserted"><ins><em>optional</a>. Not
+ as bad as what the others do.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method Editor">IME</abbr></a>.</p>
+ <li id="M201401150.1">
+ <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
</li>
- <li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
-
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312270">
+ <p>The</em></ins></span> nonfree Snapchat app's principal purpose is
to restrict the
+ use of data on the user's computer, but <span
class="removed"><del><strong>it does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
it tries to get the user's list of other people's phone
- numbers</a>.</p>
+ numbers.</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Spyware in Mobile Applications</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul>
+ <li>
+ <p>The moviepass app and dis-service spy on users even more than
users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
+ </li>
+
+ <li><p>AI-powered driving apps can
+ <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p>
+ </li>
+
+ <li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
+ </li>
+
+ <li>
+ <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening to or watching</a>. In addition, it may
+ be analyzing people's conversations to serve them with targeted
+ advertisements.</p>
+ </li>
+
+ <li>
+ <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span> <span class="inserted"><ins><em>it does surveillance
too:</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"></em></ins></span>
+ it <span class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>tries</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span> <span
class="inserted"><ins><em>get</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>user's list of other people's phone
+ numbers</a>.</p></em></ins></span>
</li>
- <li id="M201312060">
- <p>The Brightest Flashlight app <a
-
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <span class="removed"><del><strong><li>
+ <p>Verizon</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312060">
+ <p>The Brightest Flashlight app</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies</a>.</p>
- <p>The FTC criticized this app because it asked the user to
- approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
- surveillance: why should a flashlight app send any information to
- anyone? A free software flashlight app would not.</p>
+ <p>The FTC criticized this</em></ins></span> app <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>because</em></ins></span> it <span
class="removed"><del><strong>will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about</strong></del></span> <span
class="inserted"><ins><em>asked</em></ins></span> the <span
class="removed"><del><strong>users' searches that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>user to
+ approve sending personal data to</em></ins></span> the app <span
class="removed"><del><strong>is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
<span class="inserted"><ins><em>developer but did not ask
+ about sending it to other companies. This shows</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>weakness
of</em></ins></span>
+ the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping
“solution” to
+ surveillance: why should a flashlight</em></ins></span> app <span
class="removed"><del><strong>takes effect. However, the</strong></del></span>
<span class="inserted"><ins><em>send any information to
+ anyone? A free software flashlight</em></ins></span> app <span
class="removed"><del><strong>remains spyware—an “optional”
piece of spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>would not.</p></em></ins></span>
</li>
- <li id="M201212100">
- <p>FTC</em></ins></span> says most mobile apps for children don't
respect privacy: <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201212100">
+ <p>FTC says most mobile apps for children don't respect
privacy:</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
@@ -1823,8 +1787,9 @@
<ul class="blurbs">
<li id="M201307110">
- <p>Skype contains <a
-
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p>
@@ -1840,75 +1805,100 @@
<ul class="blurbs">
<li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It <a
+ is found in</em></ins></span> many <span
class="removed"><del><strong>sorts of</strong></del></span> <span
class="inserted"><ins><em>proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ tracks</em></ins></span> data <span class="removed"><del><strong>in the
phone,</strong></del></span> <span class="inserted"><ins><em>on users'
computers</em></ins></span> and <span class="removed"><del><strong>in server
accounts,</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span> it <span
class="removed"><del><strong>can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before and after the ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>to third
parties</a>.</p>
</li>
<li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
+ program along with an update to</em></ins></span> the <span
class="inserted"><ins><em>massive
multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ to snoop on all open processes running on its</em></ins></span> user's
<span class="removed"><del><strong>consent”</strong></del></span> <span
class="inserted"><ins><em>computer</a>.</p>
</li>
<li id="M201711070">
- <p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
+ <p>The driver</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate
as</strong></del></span> a <span class="removed"><del><strong>protection
against massive
+ surveillance.</p>
+ </li>
+
+ <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>certain gaming keyboard</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information to China</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
<span class="inserted"><ins><em><li id="M201512290">
- <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps</strong></del></span>
+ <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles</em></ins></span> snoop on <span
class="inserted"><ins><em>their users and report to</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span>
- <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
-
- <p>A game console</em></ins></span> is <span
class="removed"><del><strong>in addition to</strong></del></span> <span
class="inserted"><ins><em>a computer, and you can't trust a computer with
- a nonfree operating system.</p>
- </li>
-
- <li id="M201509160">
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
+ video game consoles</em></ins></span> snoop on <span
class="removed"><del><strong>what radio</strong></del></span> <span
class="inserted"><ins><em>their users</em></ins></span> and <span
class="removed"><del><strong>TV programs
+ are playing nearby</a>. Also on</strong></del></span> <span
class="inserted"><ins><em>report to the
+ internet</a>—even</em></ins></span> what <span
class="inserted"><ins><em>their</em></ins></span> users <span
class="removed"><del><strong>post on various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>weigh.</p>
+
+ <p>A game console is a computer,</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>you can't trust a computer with
+ a nonfree operating system.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509160">
+ <p>Modern gratis game cr…apps</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known
faces</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of data about their users</em></ins></span> and <span
class="removed"><del><strong>suggests you to share the picture you take
according to who
+ is in</strong></del></span> <span class="inserted"><ins><em>their users'
friends and associates</a>.</p>
- <p>Even nastier, they do it through ad networks that
merge</em></ins></span> the <span class="removed"><del><strong>snooping
done</strong></del></span> <span class="inserted"><ins><em>data
- collected</em></ins></span> by <span class="removed"><del><strong>the
phone company,</strong></del></span> <span class="inserted"><ins><em>various
cr…apps</em></ins></span> and <span
class="removed"><del><strong>perhaps</strong></del></span> <span
class="inserted"><ins><em>sites made</em></ins></span> by <span
class="removed"><del><strong>the OS in the
- phone.</p>
+ <p>Even nastier, they do it through ad networks that
merge</em></ins></span> the <span class="removed"><del><strong>frame.</p>
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>different
+ <p>This spyware feature seems to require online
access</strong></del></span> <span class="inserted"><ins><em>data
+ collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can</em></ins></span> be <span
class="removed"><del><strong>distracted by the question</strong></del></span>
<span class="inserted"><ins><em>led to spend a lot</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
- users</strong></del></span> <span class="inserted"><ins><em>money. They
also
- use a back door</em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no
excuse</strong></del></span> <span class="inserted"><ins><em>manipulate the
game play</em></ins></span> for <span
class="removed"><del><strong>malware.</p></strong></del></span> <span
class="inserted"><ins><em>specific players.</p>
+ <p>They use this data</em></ins></span> to <span
class="removed"><del><strong>some
+ known-faces database, which means the pictures are
likely</strong></del></span> <span class="inserted"><ins><em>manipulate
people</em></ins></span> to <span class="inserted"><ins><em>buy things, and
hunt for
+ “whales” who can</em></ins></span> be
+ <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span
class="inserted"><ins><em>led</em></ins></span> to <span
class="removed"><del><strong>Facebook's servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>spend a lot</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
+ anymore, even if the user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>money. They also
+ use a back door</em></ins></span> to <span
class="inserted"><ins><em>manipulate</em></ins></span> the <span
class="removed"><del><strong>service.</p></strong></del></span> <span
class="inserted"><ins><em>game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
can use the same tactics.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
<span class="inserted"><ins><em><li id="M201401280">
- <p>Angry Birds</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
+ <p>Angry Birds</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased
snooping</a>,</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies</em></ins></span> for <span class="removed"><del><strong>use by
companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span> <span class="inserted"><ins><em>companies,
and</em></ins></span> the <span class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
- to <span class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>spy through</em></ins></span> it <span
class="removed"><del><strong>to other companies. This shows the
- weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies for companies,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>the
NSA takes advantage</em></ins></span>
+ to <span class="removed"><del><strong>realize that</strong></del></span>
<span class="inserted"><ins><em>spy through</em></ins></span> it <span
class="removed"><del><strong>is nasty.</p>
+
+ <p>This article shows the</strong></del></span> <span
class="inserted"><ins><em>too</a>. Here's information
on</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
@@ -1918,75 +1908,52 @@
<li id="M200510200">
<p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
+ “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>they present snooping as</strong></del></span>
<span class="inserted"><ins><em><a
href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>gamer's computer and sniffs a
- good deal of personal data</a>, including lots of activities which
- have nothing</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>do with cheating.</p></em></ins></span>
+ spies on every process running on</em></ins></span> a <span
class="removed"><del><strong>way
+ to “serve” users better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>gamer's computer and sniffs</em></ins></span> a <span
class="removed"><del><strong>typical example</strong></del></span>
+ <span class="inserted"><ins><em>good deal</em></ins></span> of
+ <span class="removed"><del><strong>the attitude</strong></del></span>
<span class="inserted"><ins><em>personal data</a>, including
lots</em></ins></span> of <span class="removed"><del><strong>the proprietary
software industry towards
+ those they</strong></del></span> <span
class="inserted"><ins><em>activities which</em></ins></span>
+ have <span class="removed"><del><strong>subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nothing to do with
cheating.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<div <span class="removed"><del><strong>class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>class="big-section">
- <h3 id="SpywareInEquipment">Spyware</em></ins></span> in <span
class="removed"><del><strong>Toys</h4></strong></del></span> <span
class="inserted"><ins><em>Connected Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInToys">#SpywareInToys</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+<div class="big-section">
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
-
-<span class="removed"><del><strong><ul>
-
- <li>
- <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two users</a>.</p>
- </li>
-
- <li></strong></del></span>
-<span class="inserted"><ins><em><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul class="blurbs">
- <li id="M201708280"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major</strong></del></span> <span
class="inserted"><ins><em>bad</em></ins></span> security <span
class="removed"><del><strong>vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers to listen</strong></del></span> in <span
class="removed"><del><strong>on a child's speech, and even speak
- into the toys themselves.</p>
- </li>
-
- <li>
- <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings</em></ins></span>
devices <span class="removed"><del><strong>report which other
+ apps the user has
+ installed.</strong></del></span> <span
class="inserted"><ins><em>allows</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop</em></ins></span> on <span class="removed"><del><strong>its users
through the proprietary control app</a>.</p>
+ to snoop on the people</em></ins></span> that <span
class="removed"><del><strong>at least</strong></del></span> <span
class="inserted"><ins><em>use them</a>.</p>
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
- <p>Note</strong></del></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>use them</a>.</p>
-
- <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
-
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
-
- <p>It is unfortunate</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span
class="removed"><del><strong>data may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>data to</strong></del></span> <span
class="inserted"><ins><em>term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>It</em></ins></span> is <span
class="removed"><del><strong>visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
</li>
-</ul>
+
+ <li><p>FTC says most mobile apps for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1994,613 +1961,608 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The
other day a woman came up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see</em></ins></span> out
- <span class="removed"><del><strong>who</strong></del></span> the <span
class="removed"><del><strong>user was.</p>
-
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>other way.” Evidently that was
+<p>Emo Phillips made a joke: The other day a woman came up to me and
+said, “Didn't I see you</em></ins></span> on <span
class="inserted"><ins><em>television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>company has been ordered to pay a
total</strong></del></span> <span class="inserted"><ins><em>TV
sees,”</a> in the own words</em></ins></span> of <span
class="removed"><del><strong>C$4m</a></strong></del></span> <span
class="inserted"><ins><em>the company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>its customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>user</a>.</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own words of the
company's
+ CTO, and this data is sold to third parties.</em></ins></span> This is in
<span class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>return for
“better service” (meaning more intrusive ads?) and slightly
lower retail prices.</p>
- <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span class="inserted"><ins><em>make this
spying acceptable, according</em></ins></span> to <span
class="removed"><del><strong>access the data</a>
- collected by</strong></del></span> <span class="inserted"><ins><em>him,
- is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span class="inserted"><ins><em>Vizio
software is
- nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>scenes,</em></ins></span>
- and <span class="inserted"><ins><em>there is no guarantee that all future
updates will leave</em></ins></span> the <span class="removed"><del><strong>FBI
could listen to these conversations
- was unacceptable by itself.</p></li>
+ <p>What is supposed to make this spying acceptable,
according</em></ins></span> to <span class="inserted"><ins><em>him,
+ is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
+ nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>phone company,</strong></del></span>
<span class="inserted"><ins><em>scenes,</em></ins></span>
+ and <span class="removed"><del><strong>perhaps by the OS
in</strong></del></span> <span class="inserted"><ins><em>there is no guarantee
that all future updates will leave</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <p>Don't be distracted by</strong></del></span>
<span class="inserted"><ins><em>settings unchanged.</p>
<p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way</em></ins></span> to <span
class="removed"><del><strong>spy on children and adults</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS:</strong></del></span> make sure <span
class="removed"><del><strong>to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware</strong></del></span> <span
class="inserted"><ins><em>it isn't spying</em></ins></span> on <span
class="removed"><del><strong>“Smart” Watches</h3>
- <span class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li>
- <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>you</em></ins></span> is <span
class="removed"><del><strong>designed
- <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- to <span class="removed"><del><strong>report its
location</strong></del></span> <span class="inserted"><ins><em>disconnect it
from the Internet, and use a terrestrial antenna
+ matter),</em></ins></span> the <span class="removed"><del><strong>question
of whether</strong></del></span> <span class="inserted"><ins><em>easiest way to
make sure it isn't spying on you is
+ to disconnect it from</em></ins></span> the <span
class="removed"><del><strong>app developers</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>someone else</strong></del></span> <span
class="inserted"><ins><em>get your own router (which can
- be an old computer running completely free software),</em></ins></span>
and <span class="inserted"><ins><em>set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>transmit
- conversations too</a>.</p>
- </li>
- <li>
- <p>A very cheap “smart watch”
comes</strong></del></span> <span class="inserted"><ins><em>block connections
to Vizio's servers. Or, as a last resort,
- you can replace your TV</em></ins></span> with <span
class="removed"><del><strong>an Android app</strong></del></span> <span
class="inserted"><ins><em>another model.</p>
+ if you are technically oriented, is to</em></ins></span> get
+ <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>your own router (which can
+ be an old computer running completely free software), and set up a
+ firewall</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>block
connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
- <li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
-
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>an unidentified site in China</a>.</p>
- <p>The</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> article <span
class="removed"><del><strong>says this is a back door, but that could be a
- misunderstanding. However,</strong></del></span> <span
class="inserted"><ins><em>for the facts</em></ins></span> it <span
class="inserted"><ins><em>presents. It</em></ins></span>
- is <span class="removed"><del><strong>certainly surveillance, at
- least.</p>
- </li>
-</ul>
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>too bad that the article finishes by advocating the
- moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install a surveillance app</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
+ <p>We link to the article</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
-<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>the facts</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>presents. It
+ is too bad that</em></ins></span> the <span
class="removed"><del><strong>user to
+ approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the
+ <span class="inserted"><ins><em>moral weakness of surrendering to Netflix.
The Netflix</em></ins></span> app <span class="removed"><del><strong>developer
but did</strong></del></span> <span class="inserted"><ins><em><a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201702060">
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</em></ins></span> that <span
class="removed"><del><strong>the specific sabotage method Lenovo used did not
affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
is <span class="inserted"><ins><em>viewed on them, and</em></ins></span> not
<span class="removed"><del><strong>really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its</strong></del></span> <span class="inserted"><ins><em>just
broadcasts and
- cable</a>. Even if the image is coming from the
user's</em></ins></span> own <span
class="removed"><del><strong>malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>computer,</em></ins></span>
- the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>TV reports what
it is. The existence</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>a way to disable the
- surveillance, even if</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
-
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ report everything that is viewed on them, and</em></ins></span> not
+ <span class="removed"><del><strong>ask about sending it to other
companies. This shows</strong></del></span> <span
class="inserted"><ins><em>just broadcasts and
+ cable</a>. Even if</em></ins></span> the
+ <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>image is coming from</em></ins></span> the
<span class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>user's own computer,
+ the TV reports what it is. The existence of</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>were not hidden as it was</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these TVs,
- does not legitimize the surveillance.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-
+ <li>
+ <p>A remote-control sex toy</strong></del></span> <span
class="inserted"><ins><em>disable the
+ surveillance, even if it were not hidden as it</em></ins></span> was <span
class="removed"><del><strong>found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</strong></del></span> <span class="inserted"><ins><em>in these TVs,
+ does not legitimize</em></ins></span> the <span
class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>surveillance.</p></em></ins></span>
+ </li>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>The “smart” toys My Friend Cayla</strong></del></span>
<span class="inserted"><ins><em><li id="M201511130">
- <p>Some web and TV advertisements play inaudible
- sounds</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>be picked up by proprietary malware
running</em></ins></span>
- on <span class="removed"><del><strong>The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>other devices</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ <p>Some web</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>TV
advertisements play inaudible
+ sounds</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
+ a speech recognition company based</strong></del></span> <span
class="inserted"><ins><em>be picked up by proprietary malware running
+ on other devices</em></ins></span> in <span
class="removed"><del><strong>the U.S.</p>
-<ul>
- <li>
- <p>Every “home security” camera, if its
manufacturer</strong></del></span> <span class="inserted"><ins><em>range so as
to determine that they
+ <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>range so as to
determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>communicate</strong></del></span> <span
class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="removed"><del><strong>it,
- is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>Web activity, and other</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer,
based</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely control the toys</strong></del></span>
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span
class="inserted"><ins><em>Web activity, and other <a
+
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
<li id="M201511060">
- <p>Vizio goes a step further than other TV
- manufacturers in spying</em></ins></span> on <span
class="removed"><del><strong>the fact</strong></del></span> <span
class="inserted"><ins><em>their users: their <a
-
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ <p>Vizio goes</em></ins></span> a <span
class="removed"><del><strong>mobile phone. This would
+ enable crackers to listen</strong></del></span> <span
class="inserted"><ins><em>step further than other TV
+ manufacturers</em></ins></span> in <span
class="inserted"><ins><em>spying</em></ins></span> on <span
class="removed"><del><strong>a child's speech, and even speak
+ into the toys themselves.</p>
+ </li>
+
+ <li>
+ <p>A computerized vibrator</strong></del></span> <span
class="inserted"><ins><em>their users: their</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</em></ins></span> that <span
class="removed"><del><strong>the device</strong></del></span> <span
class="inserted"><ins><em>advertisers can track you
+ link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span class="inserted"><ins><em>turn
this off, but having</em></ins></span> it <span
class="removed"><del><strong>also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>enabled by default
+ <p>It is possible to turn this off, but having</em></ins></span> it
<span class="removed"><del><strong>was surrounded</strong></del></span> <span
class="inserted"><ins><em>enabled</em></ins></span> by <span
class="removed"><del><strong>a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>default
is an injustice already.</p>
</li>
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>600 millions social
media profiles</em></ins></span> the company
- <span class="inserted"><ins><em>already monitors. Tivo customers are
unaware they're
+ to</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
+ standard</strong></del></span> <span class="inserted"><ins><em>company
+ already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
+ information</em></ins></span> with <span
class="removed"><del><strong>which manufacturers would make statements about
+ their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>online social media participation, Tivo can now
<a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement with online purchases</a>, exposing all
- users to new combined</em></ins></span> surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>by default.</p></em></ins></span>
+ correlate TV advertisement with online purchases</a>, exposing
all</em></ins></span>
+ users <span class="removed"><del><strong>could have
+ checked</strong></del></span> <span class="inserted"><ins><em>to new
combined surveillance by default.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The Nest Cam</strong></del></span>
+ <li id="M201507240">
+ <p>Vizio “smart” TVs recognize</em></ins></span> and
<span class="removed"><del><strong>changed.</p>
- <span class="inserted"><ins><em><li id="M201507240">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>TVs recognize and</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always</strong></del></span>
+ <p>The company that made the vibrator</strong></del></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about
how</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are</em></ins></span> watching</a>, <span
class="removed"><del><strong>even when the “owner” switches it
“off.”</p>
- <p>A “smart” device means the manufacturer is using it
to outsmart
- you.</p>
- </li>
-</ul>
+ what</em></ins></span> people <span class="removed"><del><strong>used
it</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>are watching</a>, even if</em></ins></span> it
<span class="removed"><del><strong>had sold the data to</strong></del></span>
<span class="inserted"><ins><em>isn't</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able to figure out
+ who the user was.</p>
-<ul>
- <li><p>E-books can contain JavaScript code,
- and</strong></del></span> <span class="inserted"><ins><em>even if it isn't
a TV channel.</p>
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
</li>
<li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"></em></ins></span>
- snoops on <span class="removed"><del><strong>readers</a>.</p>
+ <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they
wanted</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span>
+ <span class="inserted"><ins><em>record</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report</strong></del></span> <span class="inserted"><ins><em>what
programs people watch, and</em></ins></span> even <span
class="removed"><del><strong>which page the user reads at</strong></del></span>
what <span class="removed"><del><strong>time</a>.</p>
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used</em></ins></span> a <span class="removed"><del><strong>total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>firmware
“upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make</em></ins></span> its <span
class="removed"><del><strong>customers.</p></strong></del></span> <span
class="inserted"><ins><em>TVs snoop on what
+ users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
</li>
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span> <span class="inserted"><ins><em>they
wanted</em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502090">
+ <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess what?
+ <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span
class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
+ Nuance can save it</em></ins></span> and <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>FBI could listen</strong></del></span> <span
class="inserted"><ins><em>US or some
+ other government.</p>
+
+ <p>Speech recognition is not</em></ins></span> to <span
class="removed"><del><strong>these conversations
+ was unacceptable</strong></del></span> <span
class="inserted"><ins><em>be trusted unless it is done</em></ins></span> by
<span class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>free
+ software in your own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>third
+ parties</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
- </li>
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on</strong></del></span>
- <p>That's easy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade”</em></ins></span> to <span
class="inserted"><ins><em>make its TVs snoop on what
- users watch</a>. The TVs did not</em></ins></span> do <span
class="removed"><del><strong>because the system has no authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident</strong></del></span> that <span
class="removed"><del><strong>Nissan has no
- access. The software in the car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
+ <span class="inserted"><ins><em><li id="M201411090">
+ <p>The Amazon</em></ins></span> “Smart” <span
class="removed"><del><strong>Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>Even if no one connects to the car remotely, the cell phone
- modem enables the phone company to track the car's movements all
- the time; it is possible to physically remove the cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>when first sold.</p></em></ins></span>
+<ul>
+ <li>
+ <p>An LG “smart” watch</strong></del></span> <span
class="inserted"><ins><em>TV</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit
+ conversations too</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li>
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201502090">
- <p>The Samsung “Smart” TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
- Nuance can save it</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>invasion isn't done by malware.
The</strong></del></span> <span class="inserted"><ins><em>US or
some</em></ins></span>
- other
- <span class="removed"><del><strong>cases mentioned
are</strong></del></span> <span class="inserted"><ins><em>government.</p>
-
- <p>Speech recognition is not to be trusted unless it
is</em></ins></span> done by <span class="removed"><del><strong>proprietary
malware</strong></del></span> <span class="inserted"><ins><em>free
- software</em></ins></span> in <span class="removed"><del><strong>the
car.</p></li>
-
- <li><p>Tesla cars allow the company to
extract</strong></del></span> <span class="inserted"><ins><em>your own
computer.</p>
-
- <p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</em></ins></span>
- data <span class="removed"><del><strong>remotely and
- determine</strong></del></span> <span
class="inserted"><ins><em>containing sensitive information will be transmitted
to third
- parties</a>.</p>
- </li>
-
- <li id="M201411090">
- <p>The Amazon “Smart” TV is <a
-
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
- </li>
-
- <li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company says it doesn't
- store this information,</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201409290">
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in
China</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ on their users</a>.</p></em></ins></span>
- <p>The report was as of 2014,</em></ins></span> but <span
class="removed"><del><strong>if the state orders it</strong></del></span> <span
class="inserted"><ins><em>we don't expect this has got
+ <p>The <span class="removed"><del><strong>article says this is a
back door,</strong></del></span> <span class="inserted"><ins><em>report was as
of 2014,</em></ins></span> but <span class="inserted"><ins><em>we don't expect
this has got
better.</p>
- <p>This shows that laws requiring products</em></ins></span> to get
<span class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>users' formal
- consent before collecting personal</em></ins></span> data
- <span class="removed"><del><strong>and hand it
over,</strong></del></span> <span class="inserted"><ins><em>are totally
inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>state can store it.</p>
+ <p>This shows</em></ins></span> that <span
class="removed"><del><strong>could be</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
+ least.</p>
</li>
</ul>
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>TV will
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
<div style="clear: left;"></div>
-<ul>
- <li><p>Lots of “smart”
products</strong></del></span> <span class="inserted"><ins><em>tracking, the TV
will not
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs</em></ins></span> are
- <span class="removed"><del><strong>designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</strong></del></span> <span class="inserted"><ins><em>not
allowed</em></ins></span> to <span
class="removed"><del><strong>everyone</strong></del></span> <span
class="inserted"><ins><em>report what the
+ <p>Proper laws would say that TVs are not allowed to report what the
user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>LG
“smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>user watches, and the switch to turn this off has
- no effect</a>. (The fact that</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
- <p>Today's technological practice does not include any way of
- making</strong></del></span> <span class="inserted"><ins><em>transmission
reports</em></ins></span> a <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>404 error
- really means nothing; the server could save</em></ins></span> that <span
class="removed"><del><strong>can obey your voice commands without
- potentially spying on you. Even if</strong></del></span> <span
class="inserted"><ins><em>data anyway.)</p>
-
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>is air-gapped,</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+<ul>
+<li><p></strong></del></span> <span class="inserted"><ins><em>LG
“smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>switch
to turn this off has
+ no effect</a>. (The fact that the transmission
reports</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is
not</strong></del></span> <span class="inserted"><ins><em>404
error</em></ins></span>
+ really
+<span class="removed"><del><strong>clean since</strong></del></span> <span
class="inserted"><ins><em>means nothing; the server could save that data
anyway.)</p>
- <p>LG later said</em></ins></span> it <span
class="inserted"><ins><em>had installed a patch to stop this, but any
- product</em></ins></span> could <span class="removed"><del><strong>be
- saving up records about you for later examination.</p>
+ <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+
+ <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
</li>
+</ul>
- <li><p>Nest thermometers
- send</strong></del></span> <span class="inserted"><ins><em>spy this
way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>had installed a patch to stop this, but any
+ product could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span class="removed"><del><strong>data about
the user</a>.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
+ do lots of spying anyway</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
<span class="inserted"><ins><em><li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
- and use its camera to watch the people who are watching
TV.</p></em></ins></span>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a>
+ and use its camera to watch the people who are watching TV.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,
+ is a surveillance device.</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture</em></ins></span> to <span
class="removed"><del><strong>me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
+ <p>Amazon Ring “security” devices</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
long-term.</p>
<p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
-
- <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>how Ring used to let individual employees look
- at</em></ins></span> the <span class="removed"><del><strong>other
way.” Evidently</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent</em></ins></span> that <span class="removed"><del><strong>was
-before</strong></del></span>
- <span class="inserted"><ins><em>secondary abuse, but the primary
abuse—that</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+ passes by, the user's front door.</p></em></ins></span>
-<ul>
- <li>
- <p>Vizio
- “smart”</strong></del></span> <span
class="inserted"><ins><em>gets the
+ <p>The article <span class="removed"><del><strong>describes
wrongdoing by the manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>focuses</em></ins></span> on <span
class="inserted"><ins><em>how Ring used to let individual employees look
+ at</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent</em></ins></span> that
+ <span class="inserted"><ins><em>secondary abuse, but the primary
abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of</em></ins></span> everything
<span class="inserted"><ins><em>they
- see</a>. “Home insecurity camera” would be a better
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>device is
tethered to</strong></del></span> <span class="inserted"><ins><em>manufacturer
an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong>server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But</strong></del></span> <span class="inserted"><ins><em>better
name!</p>
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>also demonstrates</strong></del></span> <span
class="inserted"><ins><em>suggested</em></ins></span> that <span
class="inserted"><ins><em>these
+ manufacturers promise not to look at what's in</em></ins></span> the <span
class="removed"><del><strong>device gives the company</strong></del></span>
<span class="inserted"><ins><em>videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
+ <p>Over 70 brands of network-connected</em></ins></span>
surveillance <span
class="removed"><del><strong>capability.</p></strong></del></span> <span
class="inserted"><ins><em>cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs</em></ins></span> that <span class="inserted"><ins><em>allow
anyone to watch through them</a>.</p>
+ security bugs that allow anyone to watch through
them</a>.</p></em></ins></span>
</li>
- <li id="M201511250">
- <p>The Nest Cam “smart” camera</em></ins></span> is
<span class="removed"><del><strong>viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming
from</strong></del></span> <span class="inserted"><ins><em><a
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511250"></em></ins></span>
+ <p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when</em></ins></span> the <span class="removed"><del><strong>user's
own
- computer,</strong></del></span> <span
class="inserted"><ins><em>“owner” switches it
“off.”</p>
+ even when the “owner” switches it “off.”</p>
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>is. The existence of a way</strong></del></span>
- to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using it
+ to outsmart you.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not
hidden</strong></del></span> <span
class="inserted"><ins><em>product</em></ins></span> as <span
class="inserted"><ins><em>shipped doesn't act as a
- listening device, remote changes to the code could surely
convert</em></ins></span> it
+<ul>
+ <li><p>E-books can contain JavaScript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in
Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+</div>
+
+<span class="removed"><del><strong><ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
+ </li></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs"></em></ins></span>
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf</strong></del></span> <span
class="inserted"><ins><em>id="M201711244">
+ <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because the system has no authentication when
+ accessed through the modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in</strong></del></span> the <span
class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span class="inserted"><ins><em>code could
surely convert</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</strong></del></span>
<span class="inserted"><ins><em>into one.</p>
</li>
<li id="M201711100">
- <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>found to make <a
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="inserted"><ins><em>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ recordings of</em></ins></span> the <span class="removed"><del><strong>car
remotely, the cell phone
+ modem enables</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>More or less all
“smart” TVs</strong></del></span>
+ <li id="M201703140">
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through</em></ins></span> the <span
class="removed"><del><strong>phone company to track</strong></del></span> <span
class="inserted"><ins><em>proprietary control app</a>.</p>
- <span class="inserted"><ins><em><li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on <span class="removed"><del><strong>their
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its users through the proprietary control
app</a>.</p></em></ins></span>
-
- <p>The <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> was <span
class="removed"><del><strong>as</strong></del></span> <span
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
+ <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>temperature of</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>vibrator minute by
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>was surrounded by
a person's
+ body), as well as</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <li id="records-drivers"><p>Proprietary software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span> <span class="inserted"><ins><em>vibration
frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
- and changed.</p>
+ standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>drivers'
movements</a>,</strong></del></span> <span class="inserted"><ins><em>their
+ products, rather than free software</em></ins></span> which <span
class="removed"><del><strong>is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>users could
have checked</em></ins></span>
+ and
+ <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p></em></ins></span>
- <p>The company</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
- consent before</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+ <p>The <span class="removed"><del><strong>case of toll-collection
systems, mentioned in this article, is not
+ really a matter of proprietary surveillance. These systems are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for</em></ins></span> collecting <span
class="inserted"><ins><em>lots of</em></ins></span> personal <span
class="removed"><del><strong>data are totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>information
about how people
+ was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>privacy, and should</strong></del></span> <span
class="inserted"><ins><em>personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold</em></ins></span> the
<span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>a data
- broker,</em></ins></span> the <span class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>data broker</em></ins></span> would <span
class="removed"><del><strong>say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>have been able</em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>figure out who</em></ins></span> the
- user <span class="removed"><del><strong>watches — no
exceptions!</p>
- </li>
- <li><p>Vizio goes</strong></del></span> <span
class="inserted"><ins><em>was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
- their users: their</strong></del></span> <span
class="inserted"><ins><em>total of C$4m</a> to its
+ <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
+ payment systems,</strong></del></span>
+ <span class="inserted"><ins><em>true,</em></ins></span> but <span
class="inserted"><ins><em>it doesn't really matter. If it had
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't
done by malware. The other
+ cases mentioned are done by proprietary malware in the
car.</p></li>
+
+ <li><p>Tesla cars allow the company</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>extract</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> data <span
class="removed"><del><strong>remotely and
+ determine</strong></del></span>
+ <span class="inserted"><ins><em>broker,</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>data broker would
have been able to figure out who the
+ user was.</p>
+
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>). The</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the</em></ins></span> company <span class="removed"><del><strong>says it
doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>has been ordered to pay a total of C$4m</a> to
its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+ <p>“CloudPets” toys with microphones <a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>access</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so that advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>these
- conversations was unacceptable</em></ins></span> by <span
class="removed"><del><strong>default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>itself.</p></em></ins></span>
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> the <span
class="removed"><del><strong>state can store it.</p>
</li>
+</ul>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
- <span class="inserted"><ins><em><li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
-
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance
Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>600 millions social media
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.</p>
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Lots of</strong></del></span> <span
class="inserted"><ins><em>these
+ conversations was unacceptable by itself.</p>
+ </li>
+
+ <li id="M201612060">
+ <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>products are
+ designed</strong></del></span> <span class="inserted"><ins><em>toys My
Friend Cayla and i-Que transmit</em></ins></span> <a <span
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span
class="removed"><del><strong>everyone</strong></del></span> <span
class="inserted"><ins><em>Nuance Communications</a>, a speech recognition
+ company based</em></ins></span> in the <span
class="removed"><del><strong>house, all</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information</strong></del></span>
<span class="inserted"><ins><em>toys</em></ins></span> with <span
class="removed"><del><strong>online
- social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+
+ <p>Today's technological practice does not include any way of
+ making</strong></del></span> <span class="inserted"><ins><em>toys
with</em></ins></span> a <span class="removed"><del><strong>device that can
obey your voice commands without
+ potentially spying</strong></del></span> <span
class="inserted"><ins><em>mobile phone. This would enable
+ crackers to listen in</em></ins></span> on <span
class="removed"><del><strong>you. Even if it is air-gapped, it could be
+ saving up records about you for later examination.</p>
+ </li>
+
+ <li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <li id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on other <span
class="removed"><del><strong>devices</strong></del></span> <span
class="inserted"><ins><em>people, DJI is</em></ins></span> in
- <span class="removed"><del><strong>range so as to determine that they
are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>many
cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't a TV channel.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that</strong></del></span> <span
class="inserted"><ins><em>people, DJI</em></ins></span> is <span
class="removed"><del><strong>viewed</strong></del></span> <span
class="inserted"><ins><em>in many cases <a
+
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>them, and not just broadcasts
+ and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -2609,87 +2571,98 @@
<ul class="blurbs">
<li id="M201902080">
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- snooping all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>time</a>.</p>
- </li>
- <li><p>The Samsung “Smart” TV
- <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span> <span class="inserted"><ins><em>user is
still
- paying for</em></ins></span> the <span
class="removed"><del><strong>internet to another
- company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>coming from</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for</em></ins></span> the <span class="removed"><del><strong>user's
own
+ computer,</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
paid for.</p>
- <p>Even though the ink subscription program may be cheaper in some
- specific cases,</em></ins></span> it <span class="inserted"><ins><em>spies
on users,</em></ins></span> and <span class="inserted"><ins><em>involves
totally unacceptable
- restrictions in the use of ink cartridges that</em></ins></span> would
<span class="removed"><del><strong>then have</strong></del></span> <span
class="inserted"><ins><em>otherwise be in
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>TV reports what</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
+ specific cases,</em></ins></span> it <span
class="removed"><del><strong>is. The existence</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+ restrictions in the use</em></ins></span> of <span
class="inserted"><ins><em>ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn</em></ins></span> it <span class="inserted"><ins><em>into a listening
device</a> for them.</p>
-
- <p>It was very difficult for them</em></ins></span> to <span
class="inserted"><ins><em>do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the US
- <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span>
or <span class="removed"><del><strong>some other government.</p>
- <p>Speech recognition is not</strong></del></span> <span
class="inserted"><ins><em>cease</em></ins></span> to <span
class="removed"><del><strong>be trusted unless it is done
- by free software</strong></del></span> <span
class="inserted"><ins><em>sell the product</em></ins></span> in <span
class="removed"><del><strong>your own computer.</p>
-
- <p>In its privacy policy, Samsung explicitly
confirms</strong></del></span> that <span class="inserted"><ins><em>country,
- do you think Amazon would have the moral fiber to say no?</p>
-
- <p>These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be
transmitted</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking”</em></ins></span> to
- <span class="removed"><del><strong>third
parties</a>.</p></strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
+ <p>Crackers found</em></ins></span> a way to
+ <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as it was in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon
device,
+ and</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+
+ <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
+
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
+ <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
+ their users: their</strong></del></span>
<span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports what
the</strong></del></span>
+ <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in detail and
+ link them your IP address</a> so</strong></del></span>
<span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its</em></ins></span>
user <span class="removed"><del><strong>watches, and</strong></del></span>
<span class="inserted"><ins><em>by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ offers a gratis electronic toothbrush</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em>snoops on its
user</em></ins></span> by <span class="removed"><del><strong>default
+ is an injustice already.</p></strong></del></span>
+ <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p></em></ins></span>
</li>
- <li id="M201706204">
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706204">
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span class="removed"><del><strong>turn this
off has no effect. (The fact that</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the
- <span class="removed"><del><strong>transmission reports a 404 error
really means nothing;</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>server
- could save</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listen</em></ins></span> to <span class="inserted"><ins><em>everyone
in</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
-
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices</strong></del></span> <span
class="inserted"><ins><em>can obey your voice commands without potentially
spying</em></ins></span>
- on <span class="removed"><del><strong>the user's local
network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped,</em></ins></span> it
<span class="removed"><del><strong>had installed a patch to stop this, but any
product</strong></del></span> could <span class="removed"><del><strong>spy this
way.</p>
-
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>be saving up records
+ a device that</em></ins></span> can <span class="removed"><del><strong>now
<a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible sounds
to</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
+ on you. Even if it is air-gapped, it could</em></ins></span> be
+ <span class="removed"><del><strong>picked</strong></del></span> <span
class="inserted"><ins><em>saving</em></ins></span> up <span
class="removed"><del><strong>by proprietary malware
running</strong></del></span> <span class="inserted"><ins><em>records
about you for later examination.</p>
</li>
<li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot</em></ins></span> of <span class="removed"><del><strong>spying
anyway</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>data about the
user</a>.</p></em></ins></span>
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201310260"></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops</strong></del></span>
- <span
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>what programs</strong></del></span> <span
class="inserted"><ins><em>their renters</a>.</p>
+ <li id="M201310260">
+ <p><a
+
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
</li>
</ul>
@@ -2703,10 +2676,12 @@
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
- monitor how often</em></ins></span> people <span
class="removed"><del><strong>watch, and even</strong></del></span> <span
class="inserted"><ins><em>wear it</a>.</p>
+ monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
- monitor every aspect of</em></ins></span> what they <span
class="removed"><del><strong>wanted</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
+ monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
</ul>
@@ -2715,103 +2690,136 @@
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
<p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <li id="M201407090">
- <p>An LG “smart” watch is designed <a
+ <span class="inserted"><ins><em><li id="M201407090">
+ <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
- to report its location to someone else and</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>transmit conversations
- too</a>.</p></em></ins></span>
+ to report its location to someone else</em></ins></span> and
+ <span class="removed"><del><strong><a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
+ even if</strong></del></span> <span class="inserted"><ins><em>to
transmit conversations
+ too</a>.</p>
</li>
</ul>
-<span class="removed"><del><strong><!-- #SpywareInGames
--></strong></del></span>
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareInGames">Spyware in
Games</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInVehicles">Vehicles</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
-
- <li>
- <p>The driver</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201811300">
- <p>In China, it is mandatory</em></ins></span> for <span
class="inserted"><ins><em>electric
- cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>certain gaming keyboard</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information</strong></del></span>
+ <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
+ cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
+ </li>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ snooping all</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
- transfers technical data, including car location,</em></ins></span>
- to <span
class="removed"><del><strong>China</a>.</p></strong></del></span>
<span class="inserted"><ins><em>a government-run platform</a>. In
practice, <a
+ transfers technical data, including car location,
+ to a government-run platform</a>. In practice, <a
href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
- forward it to the government-run platform.</p></em></ins></span>
+ forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
<span class="inserted"><ins><em><li id="M201810230">
- <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <p>GM</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked the choices of radio programs</a> in its
+ tracked</em></ins></span> the <span class="removed"><del><strong>internet
to another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but it could have got that easily
by
- sneaking it into the contract that</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends
personal</strong></del></span> <span class="inserted"><ins><em>sign for some
digital service
- or other. A requirement for consent is effectively no protection.</p>
-
- <p>The cars can also collect lots of other data: listening to you,
- watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>about them</strong></del></span> <span
class="inserted"><ins><em>collection should be forbidden.</p>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
+
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
+ by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
+ watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
+
+ <p>In its privacy policy, Samsung explicitly confirms
+ that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice</strong></del></span>
<span class="inserted"><ins><em>movements, tracking passengers' cell
+ phones. <em>All</em> such</em></ins></span> data <span
class="removed"><del><strong>containing sensitive information
will</strong></del></span> <span class="inserted"><ins><em>collection
should</em></ins></span> be <span
class="removed"><del><strong>transmitted</strong></del></span> <span
class="inserted"><ins><em>forbidden.</p>
<p>But if you really want</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that
data.</p></em></ins></span>
+ <span class="removed"><del><strong>third parties</a>.</p>
</li>
+ <li><p>Spyware in
+ <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user watches,
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn
this off has no effect. (The fact</strong></del></span> <span
class="inserted"><ins><em>car's
+ hardware cannot collect any of</em></ins></span> that <span
class="removed"><del><strong>the
+ transmission reports a 404 error really means nothing; the server
+ could save</strong></del></span> <span class="inserted"><ins><em>data,
or</em></ins></span> that <span class="removed"><del><strong>data
anyway.)</p>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+ <p>Even worse, it
+ <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>software
+ is free so we know</em></ins></span> it <span
class="removed"><del><strong>had installed a patch to stop this, but any product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> <span class="inserted"><ins><em>won't collect
any</em></ins></span> of <span class="removed"><del><strong>spying
anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p></strong></del></span> <span
class="inserted"><ins><em>that data.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<!-- #SpywareInGames -->
+<div class="big-section">
+ <h3 id="SpywareInGames">Spyware in Games</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+
+ <li>
+ <p>The driver for a certain gaming keyboard</strong></del></span>
<span class="inserted"><ins><em><li id="M201711230">
- <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span>
+ <p>AI-powered driving apps can</em></ins></span> <a <span
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
+ to China</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ track your every move</a>.</p></em></ins></span>
</li>
- <li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p>
+ <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree software
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p></em></ins></span>
</li>
- <li id="M201602240">
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201602240">
<p id="nissan-modem">The Nissan Leaf has a built-in
- cell phone modem which allows effectively anyone to <a
- href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely</em></ins></span> and <span
class="inserted"><ins><em>make changes in various
+ cell phone modem which allows effectively anyone to</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
+ access its computers remotely</em></ins></span> and <span
class="removed"><del><strong>the NSA takes advantage</strong></del></span>
<span class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication
- when accessed through the modem. However, even if it asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
- it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects to the car remotely, the cell phone modem
- enables</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>phone
company</em></ins></span> to <span class="removed"><del><strong>spy
through</strong></del></span> <span class="inserted"><ins><em>track the car's
movements all the time;</em></ins></span>
- it <span class="removed"><del><strong>too</a>.
+ <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
+ when accessed</em></ins></span> through <span
class="inserted"><ins><em>the modem. However, even if</em></ins></span> it
<span class="removed"><del><strong>too</a>.
Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
@@ -2819,22 +2827,29 @@
More about NSA app spying</a>.</p>
</li>
- <li><p>Many
- <a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span class="inserted"><ins><em>physically
remove</em></ins></span> the
+ <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>asked
+ for authentication, you couldn't be confident that Nissan
+ has no access. The software in the car is proprietary,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
+ it demands blind faith from its users</a>.</p>
+
+ <p>Even if no one connects</em></ins></span> to the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>cell phone modem, though.</p></em></ins></span>
+ <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
+ enables the phone company to track the car's movements all the time;
+ it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
<a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
+ collect a wide range of data about their users</strong></del></span>
<span class="inserted"><ins><em><li id="M201306140">
- <p>Tesla cars allow the company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ <p>Tesla cars allow the company to extract
+ data remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
@@ -2883,20 +2898,21 @@
<li><p>Users are suing Bose for
<a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>.
- Specifically, the app would record</strong></del></span>
+ Specifically, the app would record the names of the audio files
+ users listen to along with the headphone's unique serial number.
+ </p>
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave
consent</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201612230">
<p>VR equipment, measuring every slight motion,
- creates</em></ins></span> the <span class="removed"><del><strong>names
of</strong></del></span> <span class="inserted"><ins><em>potential
for</em></ins></span> the <span class="removed"><del><strong>audio files
- users listen</strong></del></span> <span class="inserted"><ins><em>most
intimate
- surveillance ever. All it takes</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
- </p>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that</strong></del></span> make <span
class="removed"><del><strong>it acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>this potential
real</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
- illegal to design</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ creates the potential</em></ins></span> for <span
class="removed"><del><strong>this,
+ would that make</strong></del></span> <span
class="inserted"><ins><em>the most intimate
+ surveillance ever. All</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
+ <a href="/philosophy/surveillance-vs-democracy.html">
+ illegal</strong></del></span> <span
class="inserted"><ins><em>takes</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>make this potential real <a
+
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
software as malicious as many other programs listed in this
page</a>.</p>
@@ -3008,23 +3024,20 @@
<span class="inserted"><ins><em><li id="M201110040">
<p>Pages that contain “Like” buttons <a
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>those pages</a>—even users
+ enable Facebook</em></ins></span> to <span
class="removed"><del><strong>directly examine users'
data</a>.</p></strong></del></span> <span
class="inserted"><ins><em>track visitors to those pages</a>—even
users
that don't have Facebook accounts.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><!-- WEBMASTERS: make sure to place new
items on top under each subsection --></strong></del></span>
+<span class="removed"><del><strong><!-- WEBMASTERS: make
sure</strong></del></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInFlash">Spyware in
JavaScript and Flash</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInJavaScript">JavaScript</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInFlash">#SpywareInFlash</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span></em></ins></span>
+<span class="inserted"><ins><em><div class="big-subsection">
+ <h4 id="SpywareInJavaScript">JavaScript</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li></strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201811270">
<p>Many web sites use JavaScript code <a
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
@@ -3042,8 +3055,15 @@
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
- JavaScript on its web site to give other companies personal data on
- its customers</a>.</p>
+ JavaScript on its web site</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>give other companies personal data</em></ins></span>
on <span class="removed"><del><strong>top under each subsection -->
+<div class="big-subsection">
+ <h4 id="SpywareInFlash">Spyware in JavaScript and Flash</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em>its customers</a>.</p>
</li>
<li id="M201712300"></em></ins></span>
@@ -3108,26 +3128,44 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>Google Chrome
- <a
href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
- spies on browser history, affiliations</a>,
- and other installed software.
+ <li><p>Google Chrome</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ spies</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data</em></ins></span> on <span
class="removed"><del><strong>browser history,
affiliations</a>,</strong></del></span> <span
class="inserted"><ins><em>students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services,</em></ins></span>
and <span class="inserted"><ins><em>the lack
+ of proper privacy policies, among</em></ins></span> other <span
class="removed"><del><strong>installed software.
</p>
</li>
- <li><p>Google Chrome contains a key logger that
- <a
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
- sends Google every URL typed in</a>, one key at a time.</p>
- </li>
+ <li><p>Google Chrome contains a key logger</strong></del></span>
<span class="inserted"><ins><em>things.</p>
- <li><p>Google Chrome includes a module that
- <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio to its
servers</a>.</p>
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize</em></ins></span> that
+ <span class="removed"><del><strong><a
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ sends</strong></del></span> <span class="inserted"><ins><em>the
software</em></ins></span> Google <span class="removed"><del><strong>every URL
typed in</a>, one key at a time.</p>
+ </li>
+
+ <li><p>Google Chrome includes a module
that</strong></del></span> <span class="inserted"><ins><em>uses to spy on
students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
+ activates microphones</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
+ exclusively use free software</a> for both
education</em></ins></span> and <span class="removed"><del><strong>transmits
audio</strong></del></span> <span class="inserted"><ins><em>school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board</em></ins></span> to
<span class="removed"><del><strong>its
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free
software.</p></em></ins></span>
</li>
- <li><p>Google</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Google</strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201507280">
+ <span class="inserted"><ins><em><li id="M201507280">
<p>Google</em></ins></span> Chrome makes it easy for an extension to
do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping on the user's browsing</a>, and many of them do
so.</p>
@@ -3299,7 +3337,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/03/26 10:33:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- proprietary-surveillance.de.po 17 Mar 2019 10:32:41 -0000 1.270
+++ proprietary-surveillance.de.po 26 Mar 2019 10:33:48 -0000 1.271
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -4599,6 +4599,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome makes it easy for an extension to do <a href=\"https://labs."
"detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
"\">total snooping on the user's browsing</a>, and many of them do so."
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.394
retrieving revision 1.395
diff -u -b -r1.394 -r1.395
--- proprietary-surveillance.fr.po 17 Mar 2019 16:01:34 -0000 1.394
+++ proprietary-surveillance.fr.po 26 Mar 2019 10:33:48 -0000 1.395
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2019-03-17 17:00+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3912,6 +3913,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome makes it easy for an extension to do <a href=\"https://labs."
"detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
"\">total snooping on the user's browsing</a>, and many of them do so."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary-surveillance.it-diff.html 17 Mar 2019 10:32:41 -0000
1.122
+++ proprietary-surveillance.it-diff.html 26 Mar 2019 10:33:48 -0000
1.123
@@ -1130,76 +1130,146 @@
<p>This illustrates that making unauthorized copies of
nonfree</em></ins></span> software <span class="removed"><del><strong>industry
towards
those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p></strong></del></span>
- <span class="inserted"><ins><em>is not a cure for the injustice of nonfree
software. It may avoid
- paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps for mobile devices report which
other
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ is <span class="removed"><del><strong>doing this in</strong></del></span>
<span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>way that at least is visible and
+ optional</a>. Not as bad as what the others do.</p>
+ </li>
+
+ <li><p>FTC says most mobile apps</strong></del></span> <span
class="inserted"><ins><em>cure</em></ins></span> for <span
class="removed"><del><strong>children don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-<span class="inserted"><ins><em></ul>
+
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on the user</a>. This is in addition to
+ the snooping done by the phone company, and perhaps by the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation,</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to</strong></del></span> the <span
class="removed"><del><strong>app developer</strong></del></span> <span
class="inserted"><ins><em>nasty thing,</em></ins></span> but <span
class="removed"><del><strong>did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>cannot make</em></ins></span> it <span
class="removed"><del><strong>to other companies. This shows the
+ weakness of the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>less nasty.</p></em></ins></span>
+ </li>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInGames">Spyware in
Games</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>nVidia's</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
- <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
- apps the user has
- installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way</strong></del></span>
+ <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience</strong></del></span>
+ <span class="inserted"><ins><em>library for building mobile apps, which
also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
- <span class="inserted"><ins><em>way</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
- data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
-
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on <a
- href="https://www.appcensus.mobi"> how Android</em></ins></span> apps
<span class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>use and
- misuse users' personal data</a>. As of March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%) transmit
the</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+ sent</em></ins></span> personal data <span
class="removed"><del><strong>about them</strong></del></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
+ </li>
+
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies,</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots of companies built apps that
+ way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>personal
+ data they collected would go</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
+ <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902140"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>AppCensus
database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span
class="removed"><del><strong>i-Que</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>. As
of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%)</em></ins></span>
transmit
+ <span class="removed"><del><strong><a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>listen in on a child's
speech,</strong></del></span> <span class="inserted"><ins><em>other
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
+ into the toys themselves.</p>
</li>
- <li><p>Widely used</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on</strong></del></span>
+ <li>
+ <p>A computerized vibrator</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting the temperature</strong></del></span>
<span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape tracking</em></ins></span> by
+ <span class="removed"><del><strong>minute (thus, indirectly,
whether</strong></del></span> <span class="inserted"><ins><em>resetting
it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed,</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
+ body), as well as the vibration frequency.</p>
- <p>Collecting hardware identifiers</em></ins></span> is in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>apparent violation of
- Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="inserted"><ins><em>take action. This proves
- that</em></ins></span> the <span class="removed"><del><strong>snooping
done by the phone company, and perhaps by</strong></del></span> <span
class="inserted"><ins><em>policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>in no
hurry to take action. This proves
+ that</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response:</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
+ preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>which users could</strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>users' actions</a></em></ins></span> in <span
class="inserted"><ins><em>interacting with</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
+ <p>Many nonfree apps</em></ins></span> have
+ <span class="removed"><del><strong>checked and changed.</p>
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ <p>The company that made the vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued</strong></del></span> <span class="inserted"><ins><em>a
surveillance feature</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span
class="removed"><del><strong>data may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>users' actions</a> in interacting
with</em></ins></span> the <span class="removed"><del><strong>data
to</strong></del></span> <span class="inserted"><ins><em>app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that used
to</em></ins></span>
- be <span class="removed"><del><strong>distracted by the
question</strong></del></span> <span class="inserted"><ins><em>on Google Play
had one or more malicious functionalities, such as <a
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
the user interface of most of them was designed to make uninstallation
@@ -1208,19 +1278,16 @@
<p>Users should of course uninstall these dangerous apps if they
haven't yet, but they should also stay away from nonfree apps in
general. <em>All</em> nonfree apps carry a potential risk
because
- there</em></ins></span> is no <span class="removed"><del><strong>excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>easy way of knowing what they really
do.</p></em></ins></span>
+ there is no easy way of knowing what they really do.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
+ <li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>use by
companies.</a></p></strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
+ source code—often used for invasive advertising—that could
potentially also be used to spy on users. Other technical flaws were
found as well.</p>
@@ -1233,11 +1300,11 @@
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
- <li id="M201901050"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span
class="removed"><del><strong>because</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201901050">
+ <p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>users of what it will do
+ being sued, demanding that it notify the users of what it will do
with the data.</p>
<p>I think that lawsuit is about a side issue. What the company does
@@ -1253,11 +1320,10 @@
<li id="M201812290">
<p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions</em></ins></span> to
- <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ report on the user's actions to Facebook</a>.</p>
<p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the</em></ins></span> data <span
class="inserted"><ins><em>it obtains from the same machine via
+ Facebook can correlate the data it obtains from the same machine via
various apps. Some of them send Facebook detailed information about
the user's activities in the app; others only say that the user is
using that app, but that alone is often quite informative.</p>
@@ -1852,7 +1918,8 @@
</li>
<li id="M201511060">
- <p>Vizio goes a step further than other TV
+ <p>Vizio goes</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>step further than other TV
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
@@ -1865,174 +1932,112 @@
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+ to</em></ins></span> the <span class="removed"><del><strong>data
broker</strong></del></span> <span class="inserted"><ins><em>600 millions
social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span class="removed"><del><strong>the app
developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>new combined surveillance by default.</p>
+ users to new combined surveillance by default.</p>
</li>
<li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if</em></ins></span> it <span
class="removed"><del><strong>to other companies. This shows the
- weakness of the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>isn't</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
-</div>
-
-<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about
them</strong></del></span> <span class="inserted"><ins><em>even what they
wanted</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>record</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and the NSA takes advantage</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade”</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information</strong></del></span> <span
class="inserted"><ins><em>make its TVs snoop</em></ins></span> on
- <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
- more spyware apps</a>.</p>
- <p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>what
- users watch</a>. The TVs did not do that when first
sold.</p></em></ins></span>
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
- <li></strong></del></span>
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs snoop on what
+ users watch</a>. The TVs did not do that when first sold.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit</strong></del></span> <span
class="inserted"><ins><em>Samsung “Smart” TV</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on the internet</em></ins></span> to <span
class="inserted"><ins><em>another company, Nuance</a>.</em></ins></span>
- Nuance <span class="removed"><del><strong>Communications</a>,
- a speech recognition company based in the U.S.</p>
+ <li id="M201502090">
+ <p>The Samsung “Smart” TV <a
+
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on the internet to another company,
Nuance</a>.
+ Nuance can save it and</em></ins></span> would <span
class="inserted"><ins><em>then</em></ins></span> have <span
class="removed"><del><strong>been able</strong></del></span> to <span
class="removed"><del><strong>figure out
+ who the user was.</p>
- <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> can <span class="removed"><del><strong>remotely
control the toys with a mobile phone. This</strong></del></span> <span
class="inserted"><ins><em>save it and</em></ins></span> would
- <span class="removed"><del><strong>enable crackers</strong></del></span>
<span class="inserted"><ins><em>then have to give it</em></ins></span> to <span
class="removed"><del><strong>listen in on a child's speech, and even speak
- into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span class="inserted"><ins><em>US
or some
+ <p>Following this lawsuit,
+ <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>give it to</em></ins></span> the <span
class="removed"><del><strong>company has been ordered to pay a total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>US or some
other government.</p>
- <p>Speech recognition is not to be trusted unless it is done by free
+ <p>Speech recognition is not</em></ins></span> to <span
class="inserted"><ins><em>be trusted unless it is done by free
software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms that <a
-
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
- parties</a>.</p></em></ins></span>
+ <p>In</em></ins></span> its <span
class="removed"><del><strong>customers.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
+ <li><p> “CloudPets” toys with
microphones</strong></del></span> <span class="inserted"><ins><em>privacy
policy, Samsung explicitly confirms that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="inserted"><ins><em>third
+ parties</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201411090">
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"></em></ins></span>
- snooping <span class="removed"><del><strong>on its users
through</strong></del></span> <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ <li id="M201411090">
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
</li>
<li id="M201409290">
- <p>More or less all “smart” TVs <a
-
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p></em></ins></span>
+ <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
- <p>The <span class="removed"><del><strong>app</strong></del></span>
<span class="inserted"><ins><em>report</em></ins></span> was <span
class="removed"><del><strong>reporting the temperature</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
- minute (thus, indirectly, whether it was surrounded
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't
expect this has got
+ <p>The report was as of 2014, but we don't expect this has got
better.</p>
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if</em></ins></span> a <span
class="removed"><del><strong>person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the
<span class="removed"><del><strong>vibration frequency.</p>
-
- <p>Note</strong></del></span> <span class="inserted"><ins><em>TV will
- say, “Without your consent to tracking,</em></ins></span> the <span
class="removed"><del><strong>totally inadequate proposed response: a labeling
- standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
+ say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span class="inserted"><ins><em>TV
will not
work.”</p>
- <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>make statements about
- their products, rather than free software which users could have
- checked and changed.</p>
+ <p>Proper laws would say that TVs are not allowed to report
what</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>say</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span>
the <span class="removed"><del><strong>vibrator</strong></del></span>
+ <p>That</strong></del></span>
<span class="inserted"><ins><em>user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
- people used it</a>.</p>
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>user watches,</em></ins></span> and the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>switch to turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server</em></ins></span> could <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>save that data anyway.)</p>
- <p>The company's statement</strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
- no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span
class="inserted"><ins><em>transmission reports a 404 error
- really means nothing; the server could save that</em></ins></span> data
<span class="removed"><del><strong>may be
- true, but</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
-
- <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
<span class="inserted"><ins><em><a
+ <p>Even worse, it <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said</em></ins></span> it had <span
class="removed"><del><strong>sold the data to</strong></del></span> <span
class="inserted"><ins><em>installed</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>figure out
- who the user was.</p>
+ <p>LG later said it had installed a patch</em></ins></span> to <span
class="removed"><del><strong>these conversations
+ was unacceptable by itself.</p></li>
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
- product could spy</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>way.</p>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
+ product could spy this way.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total</strong></del></span>
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>spying anyway</a>.</p></em></ins></span>
+ do lots of spying anyway</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?
- <a
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201212170">
+ <li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers</em></ins></span> found a way to <span
class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen to these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy</strong></del></span> <span class="inserted"><ins><em>break
security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
+ Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
</li>
</ul>
@@ -2097,23 +2102,20 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically,</strong></del></span>
+ <p>Specifically, it can collect</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
+ give</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>everything</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span>
+ <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be a better
name!</p>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>suggested that these
- manufacturers promise not to look at what's in</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
- security for your home. Security means making sure</em></ins></span> they
<span class="removed"><del><strong>pass it</strong></del></span> <span
class="inserted"><ins><em>don't get to
- see</em></ins></span> through <span
class="removed"><del><strong>Microsoft.</p></li>
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
<li><p>Spyware in Cisco TNP IP phones:
<a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>your camera.</p></em></ins></span>
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -2122,23 +2124,21 @@
</div>
<ul>
- <li><p>Spyware in Skype:
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>suggested that these
+ manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span> <span class="inserted"><ins><em>the
videos. That's not
+ security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
@@ -2152,7 +2152,14 @@
</div>
<ul>
- <li></strong></del></span> <span class="inserted"><ins><em>watch
through them</a>.</p>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
+ </li>
+
+ <li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
<li id="M201511250"></em></ins></span>
@@ -2178,33 +2185,62 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
<p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this</strong></del></span>
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the</em></ins></span> code <span
class="removed"><del><strong>snoops on
readers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>could surely convert it
+ universal back door</a>. If</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
into one.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only</strong></del></span>
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span>
<span class="inserted"><ins><em><li id="M201711100">
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
</li>
+</ul>
- <li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars with nonfree software
are</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two
users</a>.</p></em></ins></span>
+ </li>
+
+ <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201703140">
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</em></ins></span> its <span
class="removed"><del><strong>computers remotely and make changes in various
+ settings</a>.</p>
+
+ <p>That's easy to do because the system has no authentication when
+ accessed</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The</strong></del></span> <span class="inserted"><ins><em>was
surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
+ products, rather than free</em></ins></span> software <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>which users could have checked
and changed.</p>
<p>The company that made the vibrator <a
@@ -2212,97 +2248,120 @@
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker,</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the
- user <span class="removed"><del><strong>reads at what
time</a>.</p>
- </li>
-
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>was.</p>
-
- <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
- needed</strong></del></span> <span class="inserted"><ins><em>pay a total
of C$4m</a></em></ins></span> to <span class="removed"><del><strong>check
DRM!</p>
- </li>
-</ul>
+ <p>The company's statement that it was anonymizing</em></ins></span>
the <span class="removed"><del><strong>car is
+ proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span> <span class="inserted"><ins><em>data may be
+ true, but</em></ins></span> it <span class="removed"><del><strong>demands
blind faith from its users</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
+ <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>doesn't really matter. If it had sold the
data</em></ins></span> to <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the <span class="removed"><del><strong>car
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker
would have been able to figure out who</em></ins></span> the <span
class="removed"><del><strong>cell phone
+ modem enables</strong></del></span>
+ <span class="inserted"><ins><em>user was.</p>
-<ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></em></ins></span>
+ the <span class="removed"><del><strong>phone</strong></del></span> company
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span
class="removed"><del><strong>track the car's movements all
+ the time; it is possible</strong></del></span> <span
class="inserted"><ins><em>pay a total of C$4m</a></em></ins></span> to
<span class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span class="inserted"><ins><em>its
customers.</p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has a built-in cell phone modem which allows
- effectively
- anyone</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
-
- <p>That's easy</strong></del></span>
+ <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201702280">
+ <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
+ which is made available</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>do because the system has no authentication when
- accessed through the modem. However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span> the <span
class="removed"><del><strong>car is
- proprietary,</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what?</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>access</em></ins></span> the <span
class="removed"><del><strong>car remotely,</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>cell phone
- modem enables</strong></del></span>
+ leak childrens' conversations</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span class="inserted"><ins><em>the
manufacturer</a>. Guess what? <a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in the
car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> the <span
class="removed"><del><strong>company to extract data remotely and
+ determine</strong></del></span>
<span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>phone company</strong></del></span> <span
class="inserted"><ins><em>manufacturer and the FBI could
listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> <span
class="inserted"><ins><em>these
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>listen in on a child's speech, and even speak
into</em></ins></span> the <span class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span>
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>store it.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Nest thermometers
+ send <a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot of data about</strong></del></span> <span class="inserted"><ins><em>a
child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
</li>
- <li <span
class="removed"><del><strong>id="records-drivers"><p>Proprietary
software in cars</strong></del></span> <span
class="inserted"><ins><em>id="M201502180">
- <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>spy on children</em></ins></span> and
- <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>adults</a>.</p>
+ <span class="removed"><del><strong><li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
+ <p>Barbie <a
+
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image</strong></del></span> <span
class="inserted"><ins><em>people, DJI</em></ins></span> is <span
class="removed"><del><strong>coming from the user's own
+ computer, the TV reports what it is. The existence of a way to
+ disable the surveillance, even if it were not hidden as it
was</strong></del></span> in
+ <span class="removed"><del><strong>these TVs, does not legitimize the
surveillance.</p>
+ </li>
+
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>many
cases</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>their
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
</li>
</ul>
@@ -2313,175 +2372,132 @@
<ul class="blurbs">
<li id="M201902080"></em></ins></span>
- <p>The <span class="removed"><del><strong>case</strong></del></span>
<span class="inserted"><ins><em>HP <a
+ <p>The <span class="removed"><del><strong>report was as of 2014, but
we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products to get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a user declines consent? Probably the TV
+ will say, “Without your consent to tracking, the TV will
+ not work.”</p>
+
+ <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> the user <span
class="removed"><del><strong>watches — no exceptions!</p>
+ </li>
+ <li><p>Vizio goes a step further</strong></del></span> <span
class="inserted"><ins><em>is still
+ paying for the subscription, and hasn't printed more
pages</em></ins></span> than <span class="removed"><del><strong>other TV
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
paid for.</p>
- <p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges
that would otherwise be</em></ins></span> in <span
class="removed"><del><strong>this article, is not
- really</strong></del></span>
- <span class="inserted"><ins><em>working order.</p>
+ <p>Even though the ink subscription program may be
cheaper</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>some
+ specific cases, it spies</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing habits in
detail</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and
+ <span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
+ restrictions in the use of ink cartridges</em></ins></span> that <span
class="removed"><del><strong>advertisers can track you
+ across devices.</p>
+
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>would otherwise be in
+ working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>matter</strong></del></span> <span
class="inserted"><ins><em>way to break the security</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> an
- <span class="removed"><del><strong>intolerable invasion of
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon
device,</em></ins></span>
- and <span class="removed"><del><strong>should</strong></del></span> <span
class="inserted"><ins><em><a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a> for them.</p>
-
- <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span class="removed"><del><strong>replaced with
anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done
by malware. The other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>US
- told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>moral fiber</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
- determine the car's location at any time. (See</strong></del></span>
<span class="inserted"><ins><em>say no?</p>
+ <p>Crackers found a way</em></ins></span> to <span
class="inserted"><ins><em>break the security of an Amazon device,
+ and <a
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"></em></ins></span>
+ turn <span class="removed"><del><strong>this off, but
having</strong></del></span> it <span class="removed"><del><strong>enabled by
default
+ is an injustice already.</p>
+ </li>
+
+ <li><p>Tivo's alliance with Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>into a
listening device</a> for them.</p>
- <p>These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The</strong></del></span>
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon</em></ins></span> to <span class="inserted"><ins><em>do this,
or cease to sell</em></ins></span> the <span class="removed"><del><strong>600
millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>company already
+ monitors. Tivo customers</strong></del></span> <span
class="inserted"><ins><em>moral fiber to say no?</p>
+
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all
users</strong></del></span>
<span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ “hacking”</em></ins></span> to
+ <span class="removed"><del><strong>new combined
surveillance</strong></del></span> <span class="inserted"><ins><em>mean
“breaking security”</a>.</p>
</li>
<li id="M201804140">
- <p>A medical insurance</em></ins></span> company <span
class="removed"><del><strong>says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p>
+ offers a gratis electronic toothbrush that snoops on its
user</em></ins></span> by <span
class="removed"><del><strong>default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
+ <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p>
</li>
<li id="M201706204">
<p>Lots of “smart” products are designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>everyone in</em></ins></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>house, all</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listen</em></ins></span> to <span class="inserted"><ins><em>everyone in
the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that</em></ins></span> can <span
class="removed"><del><strong>store it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span> <span
class="inserted"><ins><em>obey your voice commands without potentially
spying</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Nest</strong></del></span> <span
class="inserted"><ins><em>you. Even if it is air-gapped, it could be saving up
records
+ a device that can obey your voice commands without potentially spying
+ on you. Even if it is air-gapped, it could</em></ins></span> be
+ <span class="removed"><del><strong>picked</strong></del></span> <span
class="inserted"><ins><em>saving</em></ins></span> up <span
class="removed"><del><strong>by proprietary malware
running</strong></del></span> <span class="inserted"><ins><em>records
about you for later examination.</p>
</li>
<li id="M201407170">
- <p id="nest-thermometers">Nest</em></ins></span> thermometers send
<a
+ <p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
data about the user</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p><a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201310260">
- <p><a</em></ins></span>
+ <li id="M201310260">
+ <p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnWearables">Wearables</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareOnWearables">#SpywareOnWearables</a>)</span></em></ins></span>
+ <h4 id="SpywareOnWearables">Wearables</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnWearables">#SpywareOnWearables</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li>
- <p>Vizio
- “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer, the TV reports what it is. The existence of a way to
- disable the surveillance, even if it were not hidden as it was in
- these TVs, does not legitimize the surveillance.</p>
- </li>
-
- <li><p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
-
- <p>The report was as of 2014, but we don't expect this has got
better.</p>
-
- <p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV
- will say, “Without your consent to tracking, the TV will
- not work.”</p>
-
- <p>Proper laws would say that TVs are not
allowed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201807260">
<p>Tommy Hilfiger clothing <a
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em>find it normal that companies
- monitor every aspect of</em></ins></span> what
- <span class="removed"><del><strong>the user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>they do.</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying on
- their users: their</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
+ monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+ </li>
+</ul>
<h5 id="SpywareOnSmartWatches">“Smart” Watches</h5>
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></em></ins></span>
- that <span class="removed"><del><strong>advertisers can track you
- across devices.</p>
-
- <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>connects</em></ins></span> to <span
class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>an unidentified site in China</a>.</p>
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects to an unidentified site in China</a>.</p>
- <p>The article says</em></ins></span> this <span
class="removed"><del><strong>off,</strong></del></span> <span
class="inserted"><ins><em>is a back door,</em></ins></span> but <span
class="removed"><del><strong>having</strong></del></span> <span
class="inserted"><ins><em>that could be a
- misunderstanding. However,</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>certainly surveillance, at
least.</p></em></ins></span>
+ <p>The article says this is a back door, but that could be a
+ misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
</li>
-
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
<span class="inserted"><ins><em><li id="M201407090">
- <p>An LG “smart” watch is designed</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>, exposing all
users</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></em></ins></span>
- to
- <span class="removed"><del><strong>new combined surveillance by
default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>report its location to someone else</em></ins></span>
and <span class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> to <span class="removed"><del><strong>be
- picked up by proprietary malware running on other devices in
- range so as</strong></del></span> <span
class="inserted"><ins><em>transmit conversations
+ <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize and</strong></del></span> <span
class="inserted"><ins><em>watch is designed</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else and to transmit conversations
too</a>.</p>
</li>
</ul>
@@ -2494,21 +2510,15 @@
<ul class="blurbs">
<li id="M201811300">
- <p>In China, it is mandatory for electric
- cars</em></ins></span> to <span class="removed"><del><strong>determine
that they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads</strong></del></span> <span class="inserted"><ins><em>be
equipped</em></ins></span> with <span class="removed"><del><strong>Web
activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
+ <p>In China,</em></ins></span> it <span
class="removed"><del><strong>isn't</strong></del></span> <span
class="inserted"><ins><em>is mandatory for electric
+ cars to be equipped with</em></ins></span> a <span
class="removed"><del><strong>TV channel.</p>
</li>
- <li><p>Vizio “smart” TVs recognize
and</strong></del></span> <span class="inserted"><ins><em>a terminal
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
- even if it isn't</strong></del></span>
+ <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching and listening all</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
transfers technical data, including car location,
- to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV</strong></del></span>
<span class="inserted"><ins><em>government-run platform</a>. In
practice,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying">
+ to a government-run platform</a>. In practice, <a
+ href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
forward it to</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>government-run
platform.</p></em></ins></span>
</li>
@@ -2524,11 +2534,11 @@
<p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
- <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
- or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
+ <p>Speech recognition is not to be trusted unless
it</strong></del></span> <span class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>done
+ by free software in</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
- <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="removed"><del><strong>be trusted
unless it is done
- by free software in</strong></del></span> <span
class="inserted"><ins><em>you,
+ <p>The cars can also collect lots of other data: listening to you,
watching you, following</em></ins></span> your <span
class="removed"><del><strong>own computer.</p>
<p>In its privacy policy, Samsung explicitly confirms
@@ -2585,28 +2595,28 @@
</li>
<li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app for</strong></del></span> <span
class="inserted"><ins><em>built-in
+ <p id="nissan-modem">The Nissan Leaf has</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>computers
remotely and make changes in various
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy to do because</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>system has no authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if it asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
+ <p>That's easy to do because the system has no authentication
+ when accessed through the modem. However, even if it
asked</em></ins></span>
+ for <span class="inserted"><ins><em>authentication, you couldn't be
confident that Nissan
+ has no access. The software in the car is proprietary, <a
href="/philosophy/free-software-even-more-important.html">which means
- it demands blind faith from its users</a>.</p>
+ it demands blind faith from</em></ins></span> its <span
class="removed"><del><strong>headphones</a>.
+Specifically,</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>along with</strong></del></span> the <span
class="removed"><del><strong>headphone's unique serial number.
+ <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>cell phone modem
+ enables</em></ins></span> the <span class="removed"><del><strong>audio
files
+users listen</strong></del></span> <span class="inserted"><ins><em>phone
company</em></ins></span> to <span class="removed"><del><strong>along with the
headphone's unique serial number.
</p>
-<p>The suit accuses that this was done without</strong></del></span>
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
- enables</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>phone company to
track</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>car's
movements all the time;</em></ins></span>
+<p>The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> the <span
class="removed"><del><strong>fine print of</strong></del></span> <span
class="inserted"><ins><em>car's movements all</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span
class="inserted"><ins><em>time;</em></ins></span>
it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
<a href="/philosophy/surveillance-vs-democracy.html">
illegal</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>physically remove</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
@@ -2628,27 +2638,27 @@
<li><p>Modern gratis game cr…apps
<a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of</strong></del></span> <span
class="inserted"><ins><em>company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their users and their users'
- friends</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
-
- <p>Even nastier, they do it through ad networks that
merge</strong></del></span> <span
class="inserted"><ins><em>determine</em></ins></span> the <span
class="removed"><del><strong>data
- collected by various cr…apps</strong></del></span> <span
class="inserted"><ins><em>car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>sites made by different
- companies.</p>
+ data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
- <p>They use</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't
store</em></ins></span> this <span class="removed"><del><strong>data to
manipulate people</strong></del></span>
- <span class="inserted"><ins><em>information, but if the state orders
it</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>get the
data</em></ins></span> and <span class="removed"><del><strong>hunt
- for “whales” who</strong></del></span> <span
class="inserted"><ins><em>hand it
- over, the state</em></ins></span> can <span
class="removed"><del><strong>be led</strong></del></span> <span
class="inserted"><ins><em>store it.</p>
+ privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+ information, but if the state orders it to get</em></ins></span> the data
+ <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
+ over, the state can store it.</p>
</li>
<li id="M201303250">
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which is made
- available</em></ins></span> to <span class="removed"><del><strong>spend a
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers,
insurance companies, and others.</p>
+ records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
+ companies.</p>
+
+ <p>They use this data to manipulate people</strong></del></span>
+ <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
+ for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
<p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -2731,21 +2741,19 @@
<p>Online</em></ins></span> sales, with tracking and surveillance of
customers, <a
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices">enables
businesses to show different people different prices</a>. Most of
- the tracking is done by recording interactions with
- <span class="removed"><del><strong>servers, but proprietary software
contributes.</p>
+ the tracking is done by recording interactions with servers, but
+ proprietary software contributes.</p>
</li>
- <li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
+ <span class="removed"><del><strong><li><p><a
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/">
Baidu's Japanese-input and Chinese-input apps spy on
users.</a></p>
</li>
<li><p>Pages that contain “Like” buttons
<a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</strong></del></span> <span
class="inserted"><ins><em>servers, but
- proprietary software contributes.</p>
- </li>
+ enable Facebook to track visitors</strong></del></span>
- <li id="M201405140">
+ <span class="inserted"><ins><em><li id="M201405140">
<p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
@@ -2796,13 +2804,14 @@
<div class="big-subsection">
<h4 <span class="removed"><del><strong>id="SpywareInChrome">Spyware in
Chrome</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInJavaScript">JavaScript</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInChrome">#SpywareInChrome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInChrome">#SpywareInChrome</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Google Chrome contains a key logger
that</strong></del></span>
+<ul>
+ <li><p>Google Chrome contains a key logger
that</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInJavaScript">#SpywareInJavaScript</a>)</span>
+</div>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201811270">
<p>Many web sites use JavaScript code</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends Google every URL</strong></del></span>
@@ -2825,33 +2834,40 @@
activates microphones and transmits audio</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
JavaScript on its web site</em></ins></span> to <span
class="inserted"><ins><em>give other companies personal data
on</em></ins></span>
- its <span
class="removed"><del><strong>servers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>customers</a>.</p>
+ its <span
class="removed"><del><strong>servers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>customers</a>.</p></em></ins></span>
</li>
- <li id="M201712300">
- <p>Some JavaScript malware <a
-
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
+ <span class="removed"><del><strong><li><p>Google Chrome makes it
easy for an extension to do</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201712300">
+ <p>Some JavaScript malware</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research">
swipes usernames from browser-based password managers</a>.</p>
</li>
<li id="M201711150">
<p>Some websites send
- JavaScript code to collect all the user's input, <a
+ JavaScript code to collect all</em></ins></span> the user's <span
class="removed"><del><strong>browsing</a>, and many of them do
so.</p></strong></del></span> <span class="inserted"><ins><em>input, <a
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/">which
can then be used to reproduce the whole session</a>.</p>
<p>If you use LibreJS, it will block that malicious JavaScript
- code.</p>
+ code.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInFlash">Flash</h4>
+ <h4 <span class="removed"><del><strong>id="SpywareInFlash">Spyware in
Flash</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInFlash">Flash</h4></em></ins></span>
<span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Flash</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201310110">
<p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
@@ -2859,104 +2875,110 @@
</li>
<li id="M201003010">
- <p>Flash Player's <a
+ <p>Flash</em></ins></span> Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track
visitors</a>.</p></em></ins></span>
+ cookie feature helps web sites track visitors</a>.</p>
</li>
- <span
class="removed"><del><strong><li><p>Google</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <span class="removed"><del><strong><li><p>Flash is also used for
+ <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices </a> to identify
users.</p>
+ </li></strong></del></span>
+</ul>
+<span class="removed"><del><strong><p><a
href="/philosophy/javascript-trap.html">Javascript code</a>
+is another method of “fingerprinting” devices.</p>
-<div class="big-subsection">
- <h4 id="SpywareInChrome">Chrome</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
-</div>
-<ul class="blurbs">
- <li id="M201507280">
- <p>Google</em></ins></span> Chrome makes it easy for an extension to
do <a
-
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on the user's browsing</a>, and many of them do
so.</p>
- </li>
-<span class="removed"><del><strong></ul>
+<!-- #SpywareEverywhere --></strong></del></span>
-<div class="big-subsection">
- <h4 id="SpywareInFlash">Spyware in Flash</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareEverywhere">Spyware
Everywhere</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInChrome">Chrome</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareEverywhere">#SpywareEverywhere</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInChrome">#SpywareInChrome</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
<ul>
- <li><p>Flash Player's</strong></del></span>
+ <li><p>The natural extension</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the
lack</em></ins></span>
+ of <span class="removed"><del><strong>monitoring people through
+ “their” phones</strong></del></span> <span
class="inserted"><ins><em>transparency on the part of both the educational
services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses to spy on students is
+ nonfree, so they can't verify what it really does. The only
remedy</em></ins></span> is
+ <span class="inserted"><ins><em>to persuade school officials
to</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary</strong></del></span> <span
class="inserted"><ins><em>href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free</em></ins></span> software <span
class="inserted"><ins><em>organizations, political parties,
+ etc.)</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>migrate</em></ins></span> the
+ <span class="removed"><del><strong>monitoring</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201506180">
+ <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able</strong></del></span> <span
class="inserted"><ins><em>public schools</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>free software.</p>
+ </li>
+
+ <li id="M201507280">
+ <p>Google Chrome makes it easy</em></ins></span> for <span
class="removed"><del><strong>speech all</strong></del></span> <span
class="inserted"><ins><em>an extension to do <a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
+ snooping on</em></ins></span> the <span class="removed"><del><strong>time,
even when “off.”</a></p></strong></del></span> <span
class="inserted"><ins><em>user's browsing</a>, and many of them do
so.</p>
+ </li>
+
+ <li id="M201506180">
<p>Google Chrome includes a module that <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
activates microphones and transmits audio to its
servers</a>.</p>
</li>
<li id="M201308040">
- <p>Google Chrome</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track
visitors</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ <p>Google Chrome <a
+ href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
spies on browser history, affiliations</a>, and other installed
- software.</p></em></ins></span>
+ software.</p>
</li>
- <span class="removed"><del><strong><li><p>Flash is also used
for</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200809060">
- <p>Google Chrome contains a key logger that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” devices </a> to identify
users.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
+ <li id="M200809060">
+ <p>Google Chrome contains a key logger that <a
+ href="http://www.favbrowser.com/google-chrome-spyware-confirmed/">
sends Google every URL typed in</a>, one key at a
time.</p></em></ins></span>
</li>
</ul>
-<span class="removed"><del><strong><p><a
href="/philosophy/javascript-trap.html">Javascript code</a>
-is another method of “fingerprinting” devices.</p>
-
-
-<!-- #SpywareEverywhere --></strong></del></span>
+<span class="removed"><del><strong><!-- #SpywareInVR
--></strong></del></span>
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareEverywhere">Spyware
Everywhere</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInNetworks">Spyware in
Networks</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareEverywhere">#SpywareEverywhere</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInNetworks">#SpywareInNetworks</a>)</span></em></ins></span>
+ <h3 <span class="removed"><del><strong>id="SpywareInVR">Spyware In
VR</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInNetworks">Spyware in
Networks</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVR">#SpywareInVR</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInNetworks">#SpywareInNetworks</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
<span class="removed"><del><strong><ul>
- <li><p>The natural extension of monitoring</strong></del></span>
+ <li><p>VR equipment, measuring every slight motion, creates the
+ potential</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201902040">
- <p>Google invites</em></ins></span> people <span
class="removed"><del><strong>through
- “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool” the
- monitoring</a>.</p>
- </li>
-
- <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</strong></del></span> to <span
class="removed"><del><strong>listen for speech</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Google invites people to <a
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and</em></ins></span> all <span
class="removed"><del><strong>the time, even when
“off.”</a></p>
- </li>
-</ul>
-
-<!-- #SpywareInVR -->
-<div class="big-section">
- <h3 id="SpywareInVR">Spyware In VR</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInVR">#SpywareInVR</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>VR equipment, measuring every slight motion, creates the
- potential</strong></del></span> <span class="inserted"><ins><em>internet
use in their
+ let Google monitor their phone use, and all internet use in their
homes,</em></ins></span> for <span class="inserted"><ins><em>an
extravagant payment of $20</a>.</p>
<p>This is not a malicious functionality of a program with some other
@@ -3049,7 +3071,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/03/26 10:33:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary-surveillance.it.po 17 Mar 2019 10:32:41 -0000 1.283
+++ proprietary-surveillance.it.po 26 Mar 2019 10:33:48 -0000 1.284
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -4346,6 +4346,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome makes it easy for an extension to do <a href=\"https://labs."
"detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
"\">total snooping on the user's browsing</a>, and many of them do so."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary-surveillance.ja-diff.html 17 Mar 2019 10:32:41 -0000
1.132
+++ proprietary-surveillance.ja-diff.html 26 Mar 2019 10:33:48 -0000
1.133
@@ -1237,43 +1237,22 @@
Note</strong></del></span>
<span class="inserted"><ins><em>various apps. Some of them send Facebook
detailed information about
the user's activities in the app; others only say</em></ins></span> that
the <span class="removed"><del><strong>specific sabotage method Lenovo used did
not affect
-GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>not really
-clean since</strong></del></span>
- <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
+GNU/Linux; also, a “clean” Windows</strong></del></span> <span
class="inserted"><ins><em>user is
+ using that app, but that alone is often quite informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
account.</p>
</li>
<li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure to place new items</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span
class="inserted"><ins><em>Android</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
record the user's location even when users disable “location
tracking”</a>.</p>
@@ -1288,8 +1267,8 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no way to save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
@@ -1297,22 +1276,18 @@
<li id="M201804160">
<p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were
found to snoop
- and collect information about its users</a>. 40%</em></ins></span>
of <span class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span class="inserted"><ins><em>the
apps were
- found to insecurely snitch on its users. Furthermore,</em></ins></span>
they <span class="removed"><del><strong>pass it through
Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
and the proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
@@ -1825,7 +1800,7 @@
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
+ load downgrades that</em></ins></span> install <span
class="inserted"><ins><em>a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
@@ -1914,7 +1889,7 @@
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is <a
+ <p>The Amazon “Smart” TV</em></ins></span> is <span
class="inserted"><ins><em><a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
snooping all the time</a>.</p>
</li>
@@ -1933,19 +1908,43 @@
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
+ <p>Proper laws would say that TVs are</em></ins></span> not <span
class="removed"><del><strong>really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>allowed</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>report
what the
user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches, and the switch to turn this off has
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what</em></ins></span> the <span
class="removed"><del><strong>emails of members of
Parliament</strong></del></span> <span class="inserted"><ins><em>user watches,
and the switch to turn</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it <a
-
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
<p>LG later said it had installed a patch to stop this, but any
@@ -2044,68 +2043,63 @@
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
+ and</strong></del></span>
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201711244">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
</li>
- <li><p>Adobe made “Digital Editions,” the e-reader
used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed to check DRM!</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>user reads at what
time</a>.</p></strong></del></span> <span
class="inserted"><ins><em>code could surely convert it
+ into one.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used
+ by most US libraries,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings</em></ins></span> of <span class="removed"><del><strong>data to
Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p></strong></del></span> <span
class="inserted"><ins><em>the conversation between two
users</a>.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in
Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software are
- <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
+<ul>
+<li><p>Computerized cars with nonfree software
are</strong></del></span>
- <li><p>The Nissan Leaf</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201703140">
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was</em></ins></span> snooping <span
class="removed"><del><strong>devices</a>.</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
effectively
- anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
+ anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> its <span
class="removed"><del><strong>computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because</strong></del></span> the <span
class="removed"><del><strong>system has no authentication when
- accessed</strong></del></span> <span class="inserted"><ins><em>code could
surely convert it
- into one.</p>
- </li>
-
- <li id="M201711100">
- <p>A remote-control sex toy was found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
- </li>
-
- <li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
+ <p>That's easy to do because the system has no authentication when
+ accessed</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> through the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>asked for
@@ -2153,166 +2147,169 @@
<p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>anonymous
payment systems, but</strong></del></span> <span
class="inserted"><ins><em>microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+ leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
- cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>data</a> collected</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>car.</p></li>
- <li><p>Tesla cars allow</strong></del></span>
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>company to extract data remotely and
+ determine</strong></del></span>
<span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
<a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and <span
class="removed"><del><strong>c.</a>). The company says it doesn't
+ store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>get the data</strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
- company <span class="removed"><del><strong>says it doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p></strong></del></span>
- <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ conversations to Nuance Communications</a>, a speech recognition
+ company based in</em></ins></span> the <span
class="removed"><del><strong>state</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>store it.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>remotely control the toys with a mobile phone. This
would enable
+ crackers</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>listen
in</em></ins></span> on <span class="removed"><del><strong>top under each
subsection -->
- <span class="inserted"><ins><em><li id="M201502180">
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>a child's speech, and even speak into the
+ toys themselves.</p>
+ </li>
+
+ <li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
+ going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
</li>
-</ul></em></ins></span>
+</ul>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span>
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>me and
+said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in
many cases</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
+ on <span class="removed"><del><strong>their
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
</div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day a woman came up</strong></del></span>
+<ul class="blurbs">
+ <li id="M201902080"></em></ins></span>
+ <p>The <span class="removed"><del><strong>report was as of 2014, but
we don't expect this has got better.</p>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201902080">
- <p>The HP <a
+ <p>This shows</strong></del></span> <span
class="inserted"><ins><em>HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>make sure the user is still
- paying for the subscription,</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see you on
television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>laws requiring
products</strong></del></span> <span class="inserted"><ins><em>constantly
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally inadequate.
+ And what happens if a</strong></del></span> <span
class="inserted"><ins><em>make sure the</em></ins></span> user <span
class="removed"><del><strong>declines consent? Probably</strong></del></span>
<span class="inserted"><ins><em>is still
+ paying for</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent to tracking,</strong></del></span>
<span class="inserted"><ins><em>subscription, and hasn't printed more pages
than were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their users</a>.</p>
-
- <p>The report was as</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
- <p>This shows</strong></del></span> <span
class="inserted"><ins><em>ink cartridges</em></ins></span> that <span
class="removed"><del><strong>laws requiring products</strong></del></span>
<span class="inserted"><ins><em>would otherwise be in
- working order.</p>
+ <p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>ink subscription
program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in</em></ins></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span class="inserted"><ins><em>use
of ink cartridges that would otherwise be in
+ working order.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <span class="inserted"><ins><em><li id="M201808120">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>step further than other TV manufacturers in spying
on
+ their users: their</strong></del></span> <span
class="inserted"><ins><em>way to break the security of an Amazon device,
+ and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+ “smart” TVs analyze your viewing
habits</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them</em></ins></span> to <span
class="removed"><del><strong>get users' formal
- consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
- easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
- not work.”</p>
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product</em></ins></span> in
<span class="removed"><del><strong>detail and
+ link them your IP address</a> so</strong></del></span> that <span
class="removed"><del><strong>advertisers can track</strong></del></span> <span
class="inserted"><ins><em>country,
+ do</em></ins></span> you
+ <span class="removed"><del><strong>across devices.</p>
- <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
+ <p>It is possible</strong></del></span> <span
class="inserted"><ins><em>think Amazon would have the moral
fiber</em></ins></span> to <span class="removed"><del><strong>turn this
off,</strong></del></span> <span class="inserted"><ins><em>say no?</p>
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
+ <p>These crackers are probably hackers too,</em></ins></span> but
<span class="removed"><del><strong>having it enabled</strong></del></span>
<span class="inserted"><ins><em>please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
- the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
+ “hacking” to mean “breaking
security”</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
+ <li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on
- <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>its user by
- sending usage data back over the Internet</a>.</p>
+ offers a gratis electronic toothbrush that snoops on its
user</em></ins></span> by <span class="removed"><del><strong>default
+ is an injustice already.</p></strong></del></span>
+ <span class="inserted"><ins><em>sending usage data back over the
Internet</a>.</p></em></ins></span>
</li>
- <li id="M201706204">
- <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>products are
designed <a
-
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone</em></ins></span> in <span
class="removed"><del><strong>detail and
- link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>the house, all the time</a>.</p>
-
- <p>Today's technological practice does not include any way of making
- a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track you
- across devices.</p>
-
- <p>It is possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
- on you. Even if</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
- about you for later examination.</p></em></ins></span>
- </li>
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households</strong></del></span>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
+ <span class="inserted"><ins><em><li id="M201706204">
+ <p>Lots of “smart” products are designed <a
+
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
+ listen</em></ins></span> to <span class="inserted"><ins><em>everyone
in</em></ins></span> the <span class="removed"><del><strong>600 millions social
media profiles</strong></del></span> <span class="inserted"><ins><em>house,
all</em></ins></span> the <span class="removed"><del><strong>company already
monitors. Tivo customers are unaware they're being watched by
advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
+ social media participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
- <span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ <p>Today's technological practice does not include any way of making
+ a device that</em></ins></span> can <span class="removed"><del><strong>now
<a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
advertisement with online purchases</a>, exposing all users to
new combined surveillance by default.</p></li>
- <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
- <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
+ <li><p>Some web and TV advertisements play inaudible sounds
to</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
+ on you. Even if it is air-gapped, it could</em></ins></span> be
+ <span class="removed"><del><strong>picked</strong></del></span> <span
class="inserted"><ins><em>saving</em></ins></span> up <span
class="removed"><del><strong>by proprietary malware
running</strong></del></span> <span class="inserted"><ins><em>records
+ about you for later examination.</p>
+ </li>
+
+ <li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send <a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
data about the user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>be
- picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ Rent-to-own computers were programmed to spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
</li>
</ul>
@@ -2427,28 +2424,34 @@
<span class="removed"><del><strong>the switch</strong></del></span>
<span class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>turn this off</strong></del></span> <span
class="inserted"><ins><em>do because the system</em></ins></span> has no <span
class="removed"><del><strong>effect. (The fact that the
- transmission reports a 404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
- when accessed through</em></ins></span> the <span
class="removed"><del><strong>server
+ <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>turn this off</strong></del></span> <span
class="inserted"><ins><em>do because the system has no authentication
+ when accessed through the modem. However, even if it asked
+ for authentication, you couldn't be confident that Nissan</em></ins></span>
+ has no <span class="removed"><del><strong>effect. (The fact
that</strong></del></span> <span class="inserted"><ins><em>access. The
software in</em></ins></span> the
+ <span class="removed"><del><strong>transmission reports a 404 error
really</strong></del></span> <span class="inserted"><ins><em>car is
proprietary, <a
+
href="/philosophy/free-software-even-more-important.html">which</em></ins></span>
means <span class="removed"><del><strong>nothing; the server
could save that data anyway.)</p>
- <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if</em></ins></span> it
+ <p>Even worse,</strong></del></span>
+ it
<span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>asked
- for authentication, you couldn't be confident that Nissan
- has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>demands blind faith from its
users</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
product
+ <p>Even if no one connects to</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
+ enables the phone company to track the car's movements all the
time;</em></ins></span>
+ it <span class="removed"><del><strong>had installed a
patch</strong></del></span> <span class="inserted"><ins><em>is
possible</em></ins></span> to <span class="removed"><del><strong>stop this, but
any product
could spy this way.</p>
- <p>Meanwhile, LG TVs</strong></del></span> <span
class="inserted"><ins><em>car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p></strong></del></span> <span
class="inserted"><ins><em>physically remove the cell phone modem,
though.</p></em></ins></span>
</li>
- <li>
+ <span class="removed"><del><strong><li>
<p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
- it demands blind faith from its users</a>.</p>
- <p>Even if no one connects</em></ins></span> to <span
class="removed"><del><strong>record.</a></p>
+ <span class="inserted"><ins><em><li id="M201306140">
+ <p>Tesla cars allow the company</em></ins></span> to <span
class="removed"><del><strong>record.</a></p>
</li>
</ul>
@@ -2462,26 +2465,21 @@
<ul>
<li><p>Many
<a
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and
report</strong></del></span> <span class="inserted"><ins><em>the car remotely,
the cell phone modem
- enables the phone company</em></ins></span> to <span
class="inserted"><ins><em>track</em></ins></span> the
+ video game consoles snoop on their users</strong></del></span> <span
class="inserted"><ins><em>extract
+ data remotely</em></ins></span> and <span
class="removed"><del><strong>report to</strong></del></span> <span
class="inserted"><ins><em>determine</em></ins></span> the
<span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
- <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car's movements all the time;
- it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
+ <p>A game console is a computer,</strong></del></span> <span
class="inserted"><ins><em>car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>you can't trust a computer with
+ a nonfree operating system.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
+ <li><p>Modern gratis game cr…apps
<a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201306140">
- <p>Tesla cars allow the company to extract</em></ins></span>
- data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
- friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
- at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+ collect a wide range</strong></del></span> <span
class="inserted"><ins><em>c</em></ins></span> of <span
class="removed"><del><strong>data about their users and their users'
+ friends and associates</a>.</p>
- <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
information, but if the state orders it to get</em></ins></span> the data
@@ -2587,13 +2585,13 @@
<li><p>Pages that contain “Like” buttons
<a
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html">
- enable Facebook to track visitors</strong></del></span>
+ enable Facebook to track visitors to those pages</a>—even
+ users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em><li id="M201405140">
<p><a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA</em></ins></span> to <span
class="removed"><del><strong>those pages</a>—even
- users that don't have Facebook accounts.</p></strong></del></span>
<span class="inserted"><ins><em>directly examine users'
+ Microsoft SkyDrive allows the NSA to directly examine users'
data</a>.</p></em></ins></span>
</li>
@@ -2694,62 +2692,87 @@
</div>
<span class="removed"><del><strong><ul>
- <li><p>Flash Player's
- <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
- cookie feature helps web sites track visitors</a>.</p>
- </li>
-
- <li><p>Flash is also</strong></del></span>
+ <li><p>Flash</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201310110">
- <p>Flash and JavaScript are</em></ins></span> used for <a
+ <p>Flash and JavaScript are used for <a
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
- “fingerprinting” <span class="removed"><del><strong>devices
</a></strong></del></span> <span
class="inserted"><ins><em>devices</a></em></ins></span> to identify
users.</p>
+ “fingerprinting” devices</a> to identify users.</p>
</li>
- <span class="inserted"><ins><em><li id="M201003010">
- <p>Flash Player's <a
+ <li id="M201003010">
+ <p>Flash</em></ins></span> Player's <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">
cookie feature helps web sites track visitors</a>.</p>
- </li></em></ins></span>
-</ul>
+ </li>
-<span class="removed"><del><strong><p><a
href="/philosophy/javascript-trap.html">Javascript code</a>
-is another method of “fingerprinting” devices.</p>
+ <span class="removed"><del><strong><li><p>Flash is also
used</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<!-- #SpywareEverywhere --></strong></del></span>
+<div class="big-subsection">
+ <h4 id="SpywareInChrome">Chrome</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks</em></ins></span> for <span
class="inserted"><ins><em>schools are</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/">
+ “fingerprinting” devices </a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses</em></ins></span> to <span
class="removed"><del><strong>identify users.</p>
+ </li>
+</ul>
+
+<p><a href="/philosophy/javascript-trap.html">Javascript
code</a></strong></del></span> <span class="inserted"><ins><em>spy on
students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to <a
href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education</em></ins></span> is <span class="removed"><del><strong>another
method of “fingerprinting” devices.</p>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareEverywhere">Spyware
Everywhere</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInChrome">Chrome</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareEverywhere">#SpywareEverywhere</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInChrome">#SpywareInChrome</a>)</span></em></ins></span>
+<!-- #SpywareEverywhere -->
+<div class="big-section">
+ <h3 id="SpywareEverywhere">Spyware Everywhere</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
+<div style="clear: left;"></div>
<ul>
- <li><p>The natural</strong></del></span>
+ <li><p>The natural extension of monitoring
people</strong></del></span> <span class="inserted"><ins><em>run nation-wide,
they need to persuade legislators
+ (e.g.,</em></ins></span> through
+ <span class="removed"><del><strong>“their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary</strong></del></span> <span
class="inserted"><ins><em>free</em></ins></span> software <span
class="inserted"><ins><em>organizations, political parties,
+ etc.)</em></ins></span> to <span class="removed"><del><strong>make sure
they can't “fool”</strong></del></span> <span
class="inserted"><ins><em>migrate</em></ins></span> the
+ <span class="removed"><del><strong>monitoring</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
+ Intel devices will be able</strong></del></span> <span
class="inserted"><ins><em>public schools</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>free software.</p>
+ </li>
-<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201507280">
- <p>Google Chrome makes it easy for an</em></ins></span> extension
<span class="removed"><del><strong>of monitoring people through
- “their” phones is <a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software</strong></del></span> to <span
class="removed"><del><strong>make sure they can't
“fool”</strong></del></span> <span class="inserted"><ins><em>do
<a
+ <p>Google Chrome makes it easy</em></ins></span> for <span
class="removed"><del><strong>speech all</strong></del></span> <span
class="inserted"><ins><em>an extension to do <a
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
- snooping on</em></ins></span> the
- <span
class="removed"><del><strong>monitoring</a>.</p></strong></del></span>
<span class="inserted"><ins><em>user's browsing</a>, and many of them do
so.</p></em></ins></span>
+ snooping on</em></ins></span> the <span class="removed"><del><strong>time,
even when “off.”</a></p></strong></del></span> <span
class="inserted"><ins><em>user's browsing</a>, and many of them do
so.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping">
- Intel devices will be able</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506180">
+ <li id="M201506180">
<p>Google Chrome includes a module that <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">
- activates microphones and transmits audio</em></ins></span> to <span
class="removed"><del><strong>listen for speech all the time, even when
“off.”</a></p></strong></del></span> <span
class="inserted"><ins><em>its servers</a>.</p>
+ activates microphones and transmits audio to its
servers</a>.</p>
</li>
<li id="M201308040">
@@ -2877,7 +2900,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/03/26 10:33:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary-surveillance.ja.po 17 Mar 2019 10:32:42 -0000 1.256
+++ proprietary-surveillance.ja.po 26 Mar 2019 10:33:48 -0000 1.257
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3688,6 +3688,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome makes it easy for an extension to do <a href=\"https://labs."
"detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
"\">total snooping on the user's browsing</a>, and many of them do so."
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary-surveillance.pot 17 Mar 2019 10:32:42 -0000 1.204
+++ proprietary-surveillance.pot 26 Mar 2019 10:33:49 -0000 1.205
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2671,6 +2671,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a "
+"href=\"https://www.eff.org/wp/school-issued-devices-and-student-privacy\"> "
+"collecting far more data on students than is necessary, and store it "
+"indefinitely</a>. Parents and students complain about the lack of "
+"transparency on the part of both the educational services and the schools, "
+"the difficulty of opting out of these services, and the lack of proper "
+"privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome makes it easy for an extension to do <a "
"href=\"https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/\">total
"
"snooping on the user's browsing</a>, and many of them do so."
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.491
retrieving revision 1.492
diff -u -b -r1.491 -r1.492
--- proprietary-surveillance.ru.po 18 Mar 2019 06:31:57 -0000 1.491
+++ proprietary-surveillance.ru.po 26 Mar 2019 10:33:49 -0000 1.492
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3867,6 +3868,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google Chrome makes it easy for an extension to do <a href=\"https://labs."
"detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
"\">total snooping on the user's browsing</a>, and many of them do so."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.de-diff.html 23 Mar 2019 10:31:41 -0000 1.64
+++ proprietary.de-diff.html 26 Mar 2019 10:33:49 -0000 1.65
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -128,14 +128,14 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -185,6 +185,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses to spy on students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to <a
href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free software.</p>
+ </li>
+
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
@@ -231,56 +253,6 @@
is also deceptive, as it uses confusing menus and complex stats to
obfuscate true monetary costs.</p>
</li>
-
- <li id="M209900000">
- <p id="addictiveness">Many games are designed to
- keep gamers compulsively playing—and renewing
- their subscription. To achieve this result, developers use <a
-
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
- techniques that derive from behavioral and brain
research</a>:</p>
-
- <dl class="compact"><dt>The Skinner Box</dt>
- <dd>An environment in which the rat… sorry, the user is
trained
- to “push the lever“, i.e. do a certain action over and
- over again in order to get a reward.</dd>
-
- <dt>Virtual food pellets</dt>
- <dd>Items that have nothing to do with the game itself, but are
- valuable to gamers because of the work required to obtain them
- (e.g., EverQuest); some people will end up collecting them for the
- sake of collecting.</dd>
-
- <dt>Random rewards</dt>
- <dd>They turn the game into the equivalent of a slot machine (e.g.,
- World of Warcraft, ZT Online).</dd>
-
- <dt>Elaborate cycles</dt>
- <dd>Gamers' behavior can be “shaped” by making cycles
- (progress from one level to the next) slower and slower, designing
- complex tasks that are difficult to get out of (e.g. World of
- Warcraft), or conversely dividing them up in small chunks to avoid
- frustration (e.g., New Super Mario Bros.Wii).</dd>
-
- <dt>Decay of game assets</dt>
- <dd>This makes it necessary for a gamer to keep playing, without
- vacations, simply to avoid losing what they have earned so far
- (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
- </dl>
-
- <p>Games such as World of Warcraft, which are considered very
addictive,
- use several of these techniques.</p>
-
- <p>However, the addictiveness of a game is only one of the
determinants
- of addiction. Equally important are the psychological make-up and life
- circumstances of the gamer. Gaming addiction, like other addictions,
- is a form of mental escape from an unrewarding life. The sad truth
- is that, in the long run, it leads to an even worse life.</p>
-
- <p><em>Note:</em> We are not gamers. If you think
we
- have misunderstood some point, or have suggestions for making
- this text clearer or more correct, please send them to <<a
- href="mailto:address@hidden">address@hidden</a>>.</p>
- </li>
</ul></em></ins></span>
@@ -341,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/03/26 10:33:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.de.po 23 Mar 2019 10:31:41 -0000 1.106
+++ proprietary.de.po 26 Mar 2019 10:33:49 -0000 1.107
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -493,94 +517,6 @@
"stats to obfuscate true monetary costs."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.es.po 23 Mar 2019 10:31:41 -0000 1.124
+++ proprietary.es.po 26 Mar 2019 10:33:49 -0000 1.125
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -376,127 +400,6 @@
"utiliza menús confusos y estadÃsticas complejas para difuminar el verdadero
"
"coste monetario."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-"Muchos juegos están diseñados para que los jugadores continúen jugando "
-"compulsivamente y renueven su suscripción. Para conseguirlo, los "
-"desarrolladores emplean <a href=\"http://www.cracked.com/article_18461_5-"
-"creepy-ways-video-games-are-trying-to-get-you-addicted.html\">técnicas "
-"derivadas de la investigación del cerebro y de la conducta</a>:"
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr "La caja de Skinner"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-"Un entorno en el cual se entrena a la rata (perdón, al usuario) para que "
-"«accione la palanca», esto es, para que realice una acción determinada una
y "
-"otra vez a fin de obtener una recompensa."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr "Bocados de comida virtuales"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-"ArtÃculos que no tiene nada que ver con el juego propiamente dicho, pero que
"
-"son valiosos para los jugadores por el trabajo exigido para obtenerlos (por "
-"ejemplo, EverQuest); algunos acaban recolectándolos simplemente por "
-"recolectarlos."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr "Recompensas aleatorias"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-"Convierten el juego en el equivalente a una máquina tragaperrras (p. e., "
-"World of Warcraft, ZT Online)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr "Ciclos elaborados"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-"El comportamiento de los jugadores puede ser «modelado» haciendo los ciclos
"
-"(el paso de un nivel al siguiente) cada vez más lentos, diseñando tareas "
-"complejas que es difÃcil llevar a cabo (p. e., World of Warcraft), o, por el
"
-"contrario, dividiéndolos en partes más pequeñas para evitar la
frustración "
-"(p. e., Nuevo Super Mario Bros.Wii)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr "Devaluación de los activos del juego"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-"Esto hace que el jugador tenga que continuar jugando, sin tomarse descansos, "
-"simplemente para evitar perder lo que han ganado hasta entonces (p. e.., "
-"Farmville, Ultima Online, Animal Crossing)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-"Juegos como World of Warcraft, que se consideran muy adictivos, emplean "
-"varias de estas técnicas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-"No obstante, la adictividad de un juego es solo uno de los factores "
-"determinantes de la adicción. Igualmente importantes son el perfil "
-"psicológico y las circunstancias vitales del jugador. La adicción a los "
-"juegos, como cualquier otra adicción, es una vÃa de escape de una vida poco
"
-"gratificante. La triste realidad es que, a la larga, lleva a una vida aún "
-"peor."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-"<em>Nota:</em>: No somos jugadores. Si cree que hemos malinterpretado algo, "
-"o tiene sugerencias para que el texto sea más claro o más correcto,
envÃelas "
-"a <<a href=\"mailto:address@hidden">address@hidden</a>>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -576,6 +479,114 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muchos juegos están diseñados para que los jugadores continúen jugando "
+#~ "compulsivamente y renueven su suscripción. Para conseguirlo, los "
+#~ "desarrolladores emplean <a href=\"http://www.cracked.com/article_18461_5-"
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">técnicas "
+#~ "derivadas de la investigación del cerebro y de la conducta</a>:"
+
+#~ msgid "The Skinner Box"
+#~ msgstr "La caja de Skinner"
+
+#~ msgid ""
+#~ "An environment in which the rat… sorry, the user is trained to "
+#~ "“push the lever“, i.e. do a certain action over and over "
+#~ "again in order to get a reward."
+#~ msgstr ""
+#~ "Un entorno en el cual se entrena a la rata (perdón, al usuario) para que "
+#~ "«accione la palanca», esto es, para que realice una acción determinada "
+#~ "una y otra vez a fin de obtener una recompensa."
+
+#~ msgid "Virtual food pellets"
+#~ msgstr "Bocados de comida virtuales"
+
+#~ msgid ""
+#~ "Items that have nothing to do with the game itself, but are valuable to "
+#~ "gamers because of the work required to obtain them (e.g., EverQuest); "
+#~ "some people will end up collecting them for the sake of collecting."
+#~ msgstr ""
+#~ "ArtÃculos que no tiene nada que ver con el juego propiamente dicho, pero "
+#~ "que son valiosos para los jugadores por el trabajo exigido para "
+#~ "obtenerlos (por ejemplo, EverQuest); algunos acaban recolectándolos "
+#~ "simplemente por recolectarlos."
+
+#~ msgid "Random rewards"
+#~ msgstr "Recompensas aleatorias"
+
+#~ msgid ""
+#~ "They turn the game into the equivalent of a slot machine (e.g., World of "
+#~ "Warcraft, ZT Online)."
+#~ msgstr ""
+#~ "Convierten el juego en el equivalente a una máquina tragaperrras (p. e., "
+#~ "World of Warcraft, ZT Online)."
+
+#~ msgid "Elaborate cycles"
+#~ msgstr "Ciclos elaborados"
+
+#~ msgid ""
+#~ "Gamers' behavior can be “shaped” by making cycles (progress "
+#~ "from one level to the next) slower and slower, designing complex tasks "
+#~ "that are difficult to get out of (e.g. World of Warcraft), or conversely "
+#~ "dividing them up in small chunks to avoid frustration (e.g., New Super "
+#~ "Mario Bros.Wii)."
+#~ msgstr ""
+#~ "El comportamiento de los jugadores puede ser «modelado» haciendo los "
+#~ "ciclos (el paso de un nivel al siguiente) cada vez más lentos, diseñando
"
+#~ "tareas complejas que es difÃcil llevar a cabo (p. e., World of Warcraft),
"
+#~ "o, por el contrario, dividiéndolos en partes más pequeñas para evitar
la "
+#~ "frustración (p. e., Nuevo Super Mario Bros.Wii)."
+
+#~ msgid "Decay of game assets"
+#~ msgstr "Devaluación de los activos del juego"
+
+#~ msgid ""
+#~ "This makes it necessary for a gamer to keep playing, without vacations, "
+#~ "simply to avoid losing what they have earned so far (e.g., Farmville, "
+#~ "Ultima Online, Animal Crossing)."
+#~ msgstr ""
+#~ "Esto hace que el jugador tenga que continuar jugando, sin tomarse "
+#~ "descansos, simplemente para evitar perder lo que han ganado hasta "
+#~ "entonces (p. e.., Farmville, Ultima Online, Animal Crossing)."
+
+#~ msgid ""
+#~ "Games such as World of Warcraft, which are considered very addictive, use "
+#~ "several of these techniques."
+#~ msgstr ""
+#~ "Juegos como World of Warcraft, que se consideran muy adictivos, emplean "
+#~ "varias de estas técnicas."
+
+#~ msgid ""
+#~ "However, the addictiveness of a game is only one of the determinants of "
+#~ "addiction. Equally important are the psychological make-up and life "
+#~ "circumstances of the gamer. Gaming addiction, like other addictions, is a "
+#~ "form of mental escape from an unrewarding life. The sad truth is that, in "
+#~ "the long run, it leads to an even worse life."
+#~ msgstr ""
+#~ "No obstante, la adictividad de un juego es solo uno de los factores "
+#~ "determinantes de la adicción. Igualmente importantes son el perfil "
+#~ "psicológico y las circunstancias vitales del jugador. La adicción a los "
+#~ "juegos, como cualquier otra adicción, es una vÃa de escape de una vida "
+#~ "poco gratificante. La triste realidad es que, a la larga, lleva a una "
+#~ "vida aún peor."
+
+#~ msgid ""
+#~ "<em>Note:</em> We are not gamers. If you think we have "
+#~ "misunderstood some point, or have suggestions for making this text "
+#~ "clearer or more correct, please send them to <<a href=\"mailto:"
+#~ "address@hidden">address@hidden</a>>."
+#~ msgstr ""
+#~ "<em>Nota:</em>: No somos jugadores. Si cree que hemos malinterpretado "
+#~ "algo, o tiene sugerencias para que el texto sea más claro o más
correcto, "
+#~ "envÃelas a <<a href=\"mailto:address@hidden">address@hidden</"
+#~ "a>>."
+
+#~ msgid ""
#~ "The Ring (now Amazon) doorbell camera is designed so that the "
#~ "manufacturer (now Amazon) can watch all the time. Now it turns out that "
#~ "<a href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.fr.po 23 Mar 2019 10:52:11 -0000 1.152
+++ proprietary.fr.po 26 Mar 2019 10:33:49 -0000 1.153
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2019-03-23 11:51+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -380,127 +405,6 @@
"utilise des menus déroutants et des statistiques complexes pour dissimuler "
"les sommes effectivement dépensées."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-"Pas mal de jeux sont conçus pour que leurs utilisateurs deviennent des "
-"joueurs compulsifs â et continuent à payer leur abonnement. Pour obtenir
ce "
-"résultat, les développeurs appliquent des <a href=\"http://www.cracked.com/"
-"article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"
-"\">techniques issues de recherches comportementales et sur le cerveau</a>Â :"
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr "La boîte de Skinner"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-"C'est un environnement dans lequel le rat… pardon, l'utilisateur est "
-"entraîné à « pousser le levier », c'est-à -dire à faire une action
donnée de "
-"manière répétitive afin d'obtenir une récompense."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr "Croquettes virtuelles"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-"Ce sont des objets qui n'ont rien à voir avec le jeu lui-même, mais sont "
-"précieux pour les joueurs à cause du travail qu'il leur a fallu fournir
pour "
-"se les procurer (exemple : EverQuest) ; pour certaines personnes, leur "
-"collection devient une fin en soi."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr "Récompenses aléatoires"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-"Elles transforment le jeu en une sorte de machine à sous (exemples : World "
-"of Warcraft, ZT Online)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr "Cycles élaborés"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-"Le comportement des joueurs peut être « façonné » en rendant les
cycles "
-"(progression de niveau en niveau) de plus en plus lents, en imaginant des "
-"tâches complexes dont il est difficile de s'extraire (exemple : World of "
-"Warcraft), ou au contraire en les fragmentant pour éviter la frustration "
-"(exemple : New Super Mario Bros.Wii)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr "Détérioration des actifs du jeu"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-"Cela pousse les joueurs à continuer à jouer sans prendre de vacances, "
-"simplement pour éviter de perdre ce qu'ils ont gagné jusque-là (exemplesÂ
: "
-"Farmville, Ultima line, Animal Crossing)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-"Des jeux considérés comme très addictifs, comme World of Warcraft,
utilisent "
-"plusieurs de ces techniques."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-"Cependant, le pouvoir addictif d'un jeu n'est pas le seul déterminant de "
-"l'addiction. Ãgalement décisives sont la structure psychologique et les "
-"conditions de vie du joueur. La dépendance au jeu, comme les autres "
-"dépendances, est un moyen de s'évader mentalement d'une vie peu
gratifiante. "
-"La triste vérité, c'est qu'à long terme elle conduit à une vie encore
pire."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-"<em>Note :</em> Nous ne sommes pas joueurs. Si vous voyez un point que nous "
-"avons mal compris ou si vous avez des suggestions pour rendre le texte plus "
-"clair, n'hésitez pas à écrire à <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -574,3 +478,112 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Pas mal de jeux sont conçus pour que leurs utilisateurs deviennent des "
+#~ "joueurs compulsifs â et continuent à payer leur abonnement. Pour
obtenir "
+#~ "ce résultat, les développeurs appliquent des <a
href=\"http://www.cracked."
+#~ "com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-"
+#~ "addicted.html\">techniques issues de recherches comportementales et sur "
+#~ "le cerveau</a>Â :"
+
+#~ msgid "The Skinner Box"
+#~ msgstr "La boîte de Skinner"
+
+#~ msgid ""
+#~ "An environment in which the rat… sorry, the user is trained to "
+#~ "“push the lever“, i.e. do a certain action over and over "
+#~ "again in order to get a reward."
+#~ msgstr ""
+#~ "C'est un environnement dans lequel le rat… pardon, l'utilisateur "
+#~ "est entraîné à « pousser le levier », c'est-à -dire à faire une
action "
+#~ "donnée de manière répétitive afin d'obtenir une récompense."
+
+#~ msgid "Virtual food pellets"
+#~ msgstr "Croquettes virtuelles"
+
+#~ msgid ""
+#~ "Items that have nothing to do with the game itself, but are valuable to "
+#~ "gamers because of the work required to obtain them (e.g., EverQuest); "
+#~ "some people will end up collecting them for the sake of collecting."
+#~ msgstr ""
+#~ "Ce sont des objets qui n'ont rien à voir avec le jeu lui-même, mais sont
"
+#~ "précieux pour les joueurs à cause du travail qu'il leur a fallu fournir "
+#~ "pour se les procurer (exemple : EverQuest) ; pour certaines personnes, "
+#~ "leur collection devient une fin en soi."
+
+#~ msgid "Random rewards"
+#~ msgstr "Récompenses aléatoires"
+
+#~ msgid ""
+#~ "They turn the game into the equivalent of a slot machine (e.g., World of "
+#~ "Warcraft, ZT Online)."
+#~ msgstr ""
+#~ "Elles transforment le jeu en une sorte de machine à sous (exemples : "
+#~ "World of Warcraft, ZT Online)."
+
+#~ msgid "Elaborate cycles"
+#~ msgstr "Cycles élaborés"
+
+#~ msgid ""
+#~ "Gamers' behavior can be “shaped” by making cycles (progress "
+#~ "from one level to the next) slower and slower, designing complex tasks "
+#~ "that are difficult to get out of (e.g. World of Warcraft), or conversely "
+#~ "dividing them up in small chunks to avoid frustration (e.g., New Super "
+#~ "Mario Bros.Wii)."
+#~ msgstr ""
+#~ "Le comportement des joueurs peut être « façonné » en rendant les
cycles "
+#~ "(progression de niveau en niveau) de plus en plus lents, en imaginant des "
+#~ "tâches complexes dont il est difficile de s'extraire (exemple : World of
"
+#~ "Warcraft), ou au contraire en les fragmentant pour éviter la frustration "
+#~ "(exemple : New Super Mario Bros.Wii)."
+
+#~ msgid "Decay of game assets"
+#~ msgstr "Détérioration des actifs du jeu"
+
+#~ msgid ""
+#~ "This makes it necessary for a gamer to keep playing, without vacations, "
+#~ "simply to avoid losing what they have earned so far (e.g., Farmville, "
+#~ "Ultima Online, Animal Crossing)."
+#~ msgstr ""
+#~ "Cela pousse les joueurs à continuer à jouer sans prendre de vacances, "
+#~ "simplement pour éviter de perdre ce qu'ils ont gagné jusque-là "
+#~ "(exemples : Farmville, Ultima line, Animal Crossing)."
+
+#~ msgid ""
+#~ "Games such as World of Warcraft, which are considered very addictive, use "
+#~ "several of these techniques."
+#~ msgstr ""
+#~ "Des jeux considérés comme très addictifs, comme World of Warcraft, "
+#~ "utilisent plusieurs de ces techniques."
+
+#~ msgid ""
+#~ "However, the addictiveness of a game is only one of the determinants of "
+#~ "addiction. Equally important are the psychological make-up and life "
+#~ "circumstances of the gamer. Gaming addiction, like other addictions, is a "
+#~ "form of mental escape from an unrewarding life. The sad truth is that, in "
+#~ "the long run, it leads to an even worse life."
+#~ msgstr ""
+#~ "Cependant, le pouvoir addictif d'un jeu n'est pas le seul déterminant de "
+#~ "l'addiction. Ãgalement décisives sont la structure psychologique et les "
+#~ "conditions de vie du joueur. La dépendance au jeu, comme les autres "
+#~ "dépendances, est un moyen de s'évader mentalement d'une vie peu "
+#~ "gratifiante. La triste vérité, c'est qu'à long terme elle conduit Ã
une "
+#~ "vie encore pire."
+
+#~ msgid ""
+#~ "<em>Note:</em> We are not gamers. If you think we have "
+#~ "misunderstood some point, or have suggestions for making this text "
+#~ "clearer or more correct, please send them to <<a href=\"mailto:"
+#~ "address@hidden">address@hidden</a>>."
+#~ msgstr ""
+#~ "<em>Note :</em> Nous ne sommes pas joueurs. Si vous voyez un point que "
+#~ "nous avons mal compris ou si vous avez des suggestions pour rendre le "
+#~ "texte plus clair, n'hésitez pas à écrire à <<a href=\"mailto:"
+#~ "address@hidden">address@hidden</a>>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.it-diff.html 23 Mar 2019 10:31:41 -0000 1.76
+++ proprietary.it-diff.html 26 Mar 2019 10:33:49 -0000 1.77
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses to spy on students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to <a
href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free software.</p>
+ </li>
+
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
@@ -230,56 +252,6 @@
is also deceptive, as it uses confusing menus and complex stats to
obfuscate true monetary costs.</p>
</li>
-
- <li id="M209900000">
- <p id="addictiveness">Many games are designed to
- keep gamers compulsively playing—and renewing
- their subscription. To achieve this result, developers use <a
-
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
- techniques that derive from behavioral and brain
research</a>:</p>
-
- <dl class="compact"><dt>The Skinner Box</dt>
- <dd>An environment in which the rat… sorry, the user is
trained
- to “push the lever“, i.e. do a certain action over and
- over again in order to get a reward.</dd>
-
- <dt>Virtual food pellets</dt>
- <dd>Items that have nothing to do with the game itself, but are
- valuable to gamers because of the work required to obtain them
- (e.g., EverQuest); some people will end up collecting them for the
- sake of collecting.</dd>
-
- <dt>Random rewards</dt>
- <dd>They turn the game into the equivalent of a slot machine (e.g.,
- World of Warcraft, ZT Online).</dd>
-
- <dt>Elaborate cycles</dt>
- <dd>Gamers' behavior can be “shaped” by making cycles
- (progress from one level to the next) slower and slower, designing
- complex tasks that are difficult to get out of (e.g. World of
- Warcraft), or conversely dividing them up in small chunks to avoid
- frustration (e.g., New Super Mario Bros.Wii).</dd>
-
- <dt>Decay of game assets</dt>
- <dd>This makes it necessary for a gamer to keep playing, without
- vacations, simply to avoid losing what they have earned so far
- (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
- </dl>
-
- <p>Games such as World of Warcraft, which are considered very
addictive,
- use several of these techniques.</p>
-
- <p>However, the addictiveness of a game is only one of the
determinants
- of addiction. Equally important are the psychological make-up and life
- circumstances of the gamer. Gaming addiction, like other addictions,
- is a form of mental escape from an unrewarding life. The sad truth
- is that, in the long run, it leads to an even worse life.</p>
-
- <p><em>Note:</em> We are not gamers. If you think
we
- have misunderstood some point, or have suggestions for making
- this text clearer or more correct, please send them to <<a
- href="mailto:address@hidden">address@hidden</a>>.</p>
- </li>
</ul></em></ins></span>
@@ -340,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/03/26 10:33:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary.it.po 23 Mar 2019 10:31:42 -0000 1.115
+++ proprietary.it.po 26 Mar 2019 10:33:49 -0000 1.116
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -486,94 +510,6 @@
"stats to obfuscate true monetary costs."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.ja-diff.html 23 Mar 2019 10:31:42 -0000 1.77
+++ proprietary.ja-diff.html 26 Mar 2019 10:33:49 -0000 1.78
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -157,10 +157,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -181,6 +181,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses to spy on students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to <a
href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free software.</p>
+ </li>
+
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
@@ -227,56 +249,6 @@
is also deceptive, as it uses confusing menus and complex stats to
obfuscate true monetary costs.</p>
</li>
-
- <li id="M209900000">
- <p id="addictiveness">Many games are designed to
- keep gamers compulsively playing—and renewing
- their subscription. To achieve this result, developers use <a
-
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
- techniques that derive from behavioral and brain
research</a>:</p>
-
- <dl class="compact"><dt>The Skinner Box</dt>
- <dd>An environment in which the rat… sorry, the user is
trained
- to “push the lever“, i.e. do a certain action over and
- over again in order to get a reward.</dd>
-
- <dt>Virtual food pellets</dt>
- <dd>Items that have nothing to do with the game itself, but are
- valuable to gamers because of the work required to obtain them
- (e.g., EverQuest); some people will end up collecting them for the
- sake of collecting.</dd>
-
- <dt>Random rewards</dt>
- <dd>They turn the game into the equivalent of a slot machine (e.g.,
- World of Warcraft, ZT Online).</dd>
-
- <dt>Elaborate cycles</dt>
- <dd>Gamers' behavior can be “shaped” by making cycles
- (progress from one level to the next) slower and slower, designing
- complex tasks that are difficult to get out of (e.g. World of
- Warcraft), or conversely dividing them up in small chunks to avoid
- frustration (e.g., New Super Mario Bros.Wii).</dd>
-
- <dt>Decay of game assets</dt>
- <dd>This makes it necessary for a gamer to keep playing, without
- vacations, simply to avoid losing what they have earned so far
- (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
- </dl>
-
- <p>Games such as World of Warcraft, which are considered very
addictive,
- use several of these techniques.</p>
-
- <p>However, the addictiveness of a game is only one of the
determinants
- of addiction. Equally important are the psychological make-up and life
- circumstances of the gamer. Gaming addiction, like other addictions,
- is a form of mental escape from an unrewarding life. The sad truth
- is that, in the long run, it leads to an even worse life.</p>
-
- <p><em>Note:</em> We are not gamers. If you think
we
- have misunderstood some point, or have suggestions for making
- this text clearer or more correct, please send them to <<a
- href="mailto:address@hidden">address@hidden</a>>.</p>
- </li>
</ul></em></ins></span>
@@ -337,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:42 $
+$Date: 2019/03/26 10:33:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary.ja.po 23 Mar 2019 10:31:42 -0000 1.98
+++ proprietary.ja.po 26 Mar 2019 10:33:49 -0000 1.99
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -406,94 +430,6 @@
"stats to obfuscate true monetary costs."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.nl-diff.html 23 Mar 2019 10:31:42 -0000 1.76
+++ proprietary.nl-diff.html 26 Mar 2019 10:33:49 -0000 1.77
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses to spy on students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to <a
href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free software.</p>
+ </li>
+
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
@@ -230,56 +252,6 @@
is also deceptive, as it uses confusing menus and complex stats to
obfuscate true monetary costs.</p>
</li>
-
- <li id="M209900000">
- <p id="addictiveness">Many games are designed to
- keep gamers compulsively playing—and renewing
- their subscription. To achieve this result, developers use <a
-
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
- techniques that derive from behavioral and brain
research</a>:</p>
-
- <dl class="compact"><dt>The Skinner Box</dt>
- <dd>An environment in which the rat… sorry, the user is
trained
- to “push the lever“, i.e. do a certain action over and
- over again in order to get a reward.</dd>
-
- <dt>Virtual food pellets</dt>
- <dd>Items that have nothing to do with the game itself, but are
- valuable to gamers because of the work required to obtain them
- (e.g., EverQuest); some people will end up collecting them for the
- sake of collecting.</dd>
-
- <dt>Random rewards</dt>
- <dd>They turn the game into the equivalent of a slot machine (e.g.,
- World of Warcraft, ZT Online).</dd>
-
- <dt>Elaborate cycles</dt>
- <dd>Gamers' behavior can be “shaped” by making cycles
- (progress from one level to the next) slower and slower, designing
- complex tasks that are difficult to get out of (e.g. World of
- Warcraft), or conversely dividing them up in small chunks to avoid
- frustration (e.g., New Super Mario Bros.Wii).</dd>
-
- <dt>Decay of game assets</dt>
- <dd>This makes it necessary for a gamer to keep playing, without
- vacations, simply to avoid losing what they have earned so far
- (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
- </dl>
-
- <p>Games such as World of Warcraft, which are considered very
addictive,
- use several of these techniques.</p>
-
- <p>However, the addictiveness of a game is only one of the
determinants
- of addiction. Equally important are the psychological make-up and life
- circumstances of the gamer. Gaming addiction, like other addictions,
- is a form of mental escape from an unrewarding life. The sad truth
- is that, in the long run, it leads to an even worse life.</p>
-
- <p><em>Note:</em> We are not gamers. If you think
we
- have misunderstood some point, or have suggestions for making
- this text clearer or more correct, please send them to <<a
- href="mailto:address@hidden">address@hidden</a>>.</p>
- </li>
</ul></em></ins></span>
@@ -340,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:42 $
+$Date: 2019/03/26 10:33:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary.nl.po 23 Mar 2019 10:31:42 -0000 1.87
+++ proprietary.nl.po 26 Mar 2019 10:33:49 -0000 1.88
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -479,94 +503,6 @@
"stats to obfuscate true monetary costs."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.pl-diff.html 23 Mar 2019 10:31:42 -0000 1.94
+++ proprietary.pl-diff.html 26 Mar 2019 10:33:49 -0000 1.95
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
+instances of malicious functionalities (with more than 400 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -126,18 +126,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses to spy on students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to <a
href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free software.</p>
+ </li>
+
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
@@ -228,56 +250,6 @@
is also deceptive, as it uses confusing menus and complex stats to
obfuscate true monetary costs.</p>
</li>
-
- <li id="M209900000">
- <p id="addictiveness">Many games are designed to
- keep gamers compulsively playing—and renewing
- their subscription. To achieve this result, developers use <a
-
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
- techniques that derive from behavioral and brain
research</a>:</p>
-
- <dl class="compact"><dt>The Skinner Box</dt>
- <dd>An environment in which the rat… sorry, the user is
trained
- to “push the lever“, i.e. do a certain action over and
- over again in order to get a reward.</dd>
-
- <dt>Virtual food pellets</dt>
- <dd>Items that have nothing to do with the game itself, but are
- valuable to gamers because of the work required to obtain them
- (e.g., EverQuest); some people will end up collecting them for the
- sake of collecting.</dd>
-
- <dt>Random rewards</dt>
- <dd>They turn the game into the equivalent of a slot machine (e.g.,
- World of Warcraft, ZT Online).</dd>
-
- <dt>Elaborate cycles</dt>
- <dd>Gamers' behavior can be “shaped” by making cycles
- (progress from one level to the next) slower and slower, designing
- complex tasks that are difficult to get out of (e.g. World of
- Warcraft), or conversely dividing them up in small chunks to avoid
- frustration (e.g., New Super Mario Bros.Wii).</dd>
-
- <dt>Decay of game assets</dt>
- <dd>This makes it necessary for a gamer to keep playing, without
- vacations, simply to avoid losing what they have earned so far
- (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
- </dl>
-
- <p>Games such as World of Warcraft, which are considered very
addictive,
- use several of these techniques.</p>
-
- <p>However, the addictiveness of a game is only one of the
determinants
- of addiction. Equally important are the psychological make-up and life
- circumstances of the gamer. Gaming addiction, like other addictions,
- is a form of mental escape from an unrewarding life. The sad truth
- is that, in the long run, it leads to an even worse life.</p>
-
- <p><em>Note:</em> We are not gamers. If you think
we
- have misunderstood some point, or have suggestions for making
- this text clearer or more correct, please send them to <<a
- href="mailto:address@hidden">address@hidden</a>>.</p>
- </li>
</ul></em></ins></span>
@@ -338,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:42 $
+$Date: 2019/03/26 10:33:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.pl.po 23 Mar 2019 10:31:42 -0000 1.82
+++ proprietary.pl.po 26 Mar 2019 10:33:49 -0000 1.83
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -561,94 +585,6 @@
"stats to obfuscate true monetary costs."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary.pot 23 Mar 2019 10:31:42 -0000 1.79
+++ proprietary.pot 26 Mar 2019 10:33:49 -0000 1.80
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a "
+"href=\"https://www.eff.org/wp/school-issued-devices-and-student-privacy\"> "
+"collecting far more data on students than is necessary, and store it "
+"indefinitely</a>. Parents and students complain about the lack of "
+"transparency on the part of both the educational services and the schools, "
+"the difficulty of opting out of these services, and the lack of proper "
+"privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a "
"href=\"https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/\"> turn "
"the Oculus Rift sensors into spy cameras</a> after breaking into the "
@@ -298,93 +323,6 @@
"confusing menus and complex stats to obfuscate true monetary costs."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a "
-"href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
"
-"techniques that derive from behavioral and brain research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to "
-"“push the lever“, i.e. do a certain action over and over again "
-"in order to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario "
-"Bros.Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a "
-"href=\"mailto:address@hidden">address@hidden</a>>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary.pt-br.po 23 Mar 2019 12:33:20 -0000 1.115
+++ proprietary.pt-br.po 26 Mar 2019 10:33:49 -0000 1.116
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2019-03-23 08:45-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -292,6 +293,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -373,126 +398,6 @@
"é enganador, pois utiliza menus confusos e estatÃsticas complexas para "
"ofuscar verdadeiros custos monetários."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-"Muitos jogos são projetados para manter os jogadores jogando compulsivamente
"
-"– e renovando suas assinaturas. Para alcançar esse resultado, os "
-"desenvolvedores usam <a href=\"http://www.cracked.com/article_18461_5-creepy-"
-"ways-video-games-are-trying-to-get-you-addicted.html\">técnicas que derivam "
-"de pesquisa comportamental e cerebral</a>:"
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr "A Caixa de Skinner"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-"Um ambiente em que o rato⦠desculpe, o usuário é treinado para
âempurrar a "
-"alavancaâ, ou seja, fazer uma certa ação várias vezes para obter uma "
-"recompensa."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr "Grãos de comida virtuais"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-"Itens que não têm nada a ver com o jogo em si, mas são valiosos para os "
-"jogadores por causa do trabalho necessário para obtê-los (por exemplo, "
-"EverQuest); algumas pessoas acabarão coletando-as por colecionar."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr "Recompensas aleatórias"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-"Eles transformam o jogo no equivalente a um caça-nÃqueis (por exemplo,
World "
-"of Warcraft, ZT Online)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr "Ciclos elaborados"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-"O comportamento dos jogadores pode ser âmoldadoâ tornando os ciclos "
-"(progrida de um nÃvel para o outro) mais e mais lento, projetando tarefas "
-"complexas das quais é difÃcil sair (por exemplo, World of Warcraft) ou "
-"dividindo-as em pequenos pedaços para evitar frustrações (por exemplo, New
"
-"Super Mario Bros.Wii)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr "Decadência de ativos <i lang=\"en\">(assets)</i> do jogo"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-"Isso torna necessário que um jogador continue jogando, sem férias, "
-"simplesmente para evitar perder o que ganhou até agora (por exemplo, "
-"Farmville, Ultima Online, Animal Crossing)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-"Jogos como World of Warcraft, que são considerados muito viciantes, usam "
-"várias dessas técnicas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-"No entanto, a dependência de um jogo é apenas um dos determinantes do
vÃcio. "
-"Igualmente importante é a constituição psicológica e as circunstâncias
da "
-"vida do jogador. O vÃcio em jogos, como outros vÃcios, é uma forma de fuga
"
-"mental de uma vida pouco recompensadora. A triste verdade é que, a longo "
-"prazo, leva a uma vida ainda pior."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-"<em>Nota:</em> Nós não somos gamers. Se você acredita que entendemos "
-"equivocadamente algum ponto ou tem sugestões para tornar esse texto mais "
-"claro ou mais correto, envie-os para <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -568,6 +473,112 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muitos jogos são projetados para manter os jogadores jogando "
+#~ "compulsivamente – e renovando suas assinaturas. Para alcançar esse "
+#~ "resultado, os desenvolvedores usam <a href=\"http://www.cracked.com/"
+#~ "article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted."
+#~ "html\">técnicas que derivam de pesquisa comportamental e cerebral</a>:"
+
+#~ msgid "The Skinner Box"
+#~ msgstr "A Caixa de Skinner"
+
+#~ msgid ""
+#~ "An environment in which the rat… sorry, the user is trained to "
+#~ "“push the lever“, i.e. do a certain action over and over "
+#~ "again in order to get a reward."
+#~ msgstr ""
+#~ "Um ambiente em que o rato⦠desculpe, o usuário é treinado para
âempurrar "
+#~ "a alavancaâ, ou seja, fazer uma certa ação várias vezes para obter
uma "
+#~ "recompensa."
+
+#~ msgid "Virtual food pellets"
+#~ msgstr "Grãos de comida virtuais"
+
+#~ msgid ""
+#~ "Items that have nothing to do with the game itself, but are valuable to "
+#~ "gamers because of the work required to obtain them (e.g., EverQuest); "
+#~ "some people will end up collecting them for the sake of collecting."
+#~ msgstr ""
+#~ "Itens que não têm nada a ver com o jogo em si, mas são valiosos para os
"
+#~ "jogadores por causa do trabalho necessário para obtê-los (por exemplo, "
+#~ "EverQuest); algumas pessoas acabarão coletando-as por colecionar."
+
+#~ msgid "Random rewards"
+#~ msgstr "Recompensas aleatórias"
+
+#~ msgid ""
+#~ "They turn the game into the equivalent of a slot machine (e.g., World of "
+#~ "Warcraft, ZT Online)."
+#~ msgstr ""
+#~ "Eles transformam o jogo no equivalente a um caça-nÃqueis (por exemplo, "
+#~ "World of Warcraft, ZT Online)."
+
+#~ msgid "Elaborate cycles"
+#~ msgstr "Ciclos elaborados"
+
+#~ msgid ""
+#~ "Gamers' behavior can be “shaped” by making cycles (progress "
+#~ "from one level to the next) slower and slower, designing complex tasks "
+#~ "that are difficult to get out of (e.g. World of Warcraft), or conversely "
+#~ "dividing them up in small chunks to avoid frustration (e.g., New Super "
+#~ "Mario Bros.Wii)."
+#~ msgstr ""
+#~ "O comportamento dos jogadores pode ser âmoldadoâ tornando os ciclos "
+#~ "(progrida de um nÃvel para o outro) mais e mais lento, projetando tarefas
"
+#~ "complexas das quais é difÃcil sair (por exemplo, World of Warcraft) ou "
+#~ "dividindo-as em pequenos pedaços para evitar frustrações (por exemplo, "
+#~ "New Super Mario Bros.Wii)."
+
+#~ msgid "Decay of game assets"
+#~ msgstr "Decadência de ativos <i lang=\"en\">(assets)</i> do jogo"
+
+#~ msgid ""
+#~ "This makes it necessary for a gamer to keep playing, without vacations, "
+#~ "simply to avoid losing what they have earned so far (e.g., Farmville, "
+#~ "Ultima Online, Animal Crossing)."
+#~ msgstr ""
+#~ "Isso torna necessário que um jogador continue jogando, sem férias, "
+#~ "simplesmente para evitar perder o que ganhou até agora (por exemplo, "
+#~ "Farmville, Ultima Online, Animal Crossing)."
+
+#~ msgid ""
+#~ "Games such as World of Warcraft, which are considered very addictive, use "
+#~ "several of these techniques."
+#~ msgstr ""
+#~ "Jogos como World of Warcraft, que são considerados muito viciantes, usam "
+#~ "várias dessas técnicas."
+
+#~ msgid ""
+#~ "However, the addictiveness of a game is only one of the determinants of "
+#~ "addiction. Equally important are the psychological make-up and life "
+#~ "circumstances of the gamer. Gaming addiction, like other addictions, is a "
+#~ "form of mental escape from an unrewarding life. The sad truth is that, in "
+#~ "the long run, it leads to an even worse life."
+#~ msgstr ""
+#~ "No entanto, a dependência de um jogo é apenas um dos determinantes do "
+#~ "vÃcio. Igualmente importante é a constituição psicológica e as "
+#~ "circunstâncias da vida do jogador. O vÃcio em jogos, como outros
vÃcios, "
+#~ "é uma forma de fuga mental de uma vida pouco recompensadora. A triste "
+#~ "verdade é que, a longo prazo, leva a uma vida ainda pior."
+
+#~ msgid ""
+#~ "<em>Note:</em> We are not gamers. If you think we have "
+#~ "misunderstood some point, or have suggestions for making this text "
+#~ "clearer or more correct, please send them to <<a href=\"mailto:"
+#~ "address@hidden">address@hidden</a>>."
+#~ msgstr ""
+#~ "<em>Nota:</em> Nós não somos gamers. Se você acredita que
entendemos "
+#~ "equivocadamente algum ponto ou tem sugestões para tornar esse texto mais "
+#~ "claro ou mais correto, envie-os para <<a href=\"mailto:address@hidden"
+#~ "org\">address@hidden</a>>."
+
+#~ msgid ""
#~ "The Ring (now Amazon) doorbell camera is designed so that the "
#~ "manufacturer (now Amazon) can watch all the time. Now it turns out that "
#~ "<a href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary.ru.po 23 Mar 2019 17:32:01 -0000 1.191
+++ proprietary.ru.po 26 Mar 2019 10:33:49 -0000 1.192
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -380,125 +405,6 @@
"запÑÑаннÑÑ
Ð¼ÐµÐ½Ñ Ð¸ ÑÑложненнÑÑ
оÑÑеÑов,
коÑоÑÑе ÑкÑÑваÑÑ Ð¸ÑÑиннÑе денежнÑе "
"заÑÑаÑÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-"Ðногие игÑÑ Ð¿ÑоекÑиÑÑÑÑÑÑ Ñак, ÑÑобÑ
игÑоки пÑинÑждалиÑÑ Ð¿ÑодолжаÑÑ "
-"игÑÑ — и возобновлÑÑÑ ÑÐ²Ð¾Ñ Ð¿Ð¾Ð´Ð¿Ð¸ÑкÑ.
ЧÑÐ¾Ð±Ñ Ð´Ð¾ÑÑиÑÑ ÑÑого, "
-"ÑазÑабоÑÑики полÑзÑÑÑÑÑ <a
href=\"http://www.cracked.com/article_18461_5-"
-"creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
пÑиемами, "
-"вÑÑекаÑÑими из иÑÑледований Ð¿Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¸
мозга</a>:"
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr "ЯÑик СкиннеÑа"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-"СÑеда, в коÑоÑой подопÑÑнÑÑ ÐºÑÑÑ... паÑдон,
полÑзоваÑÐµÐ»Ñ Ð¾Ð±ÑÑаÑÑ “"
-"нажимаÑÑ Ð½Ð° ÑÑÑаг”, Ñ.е. вÑполнÑÑÑ
опÑеделенное дейÑÑвие Ñнова и "
-"Ñнова, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ Ð²Ð¾Ð·Ð½Ð°Ð³Ñаждение."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr "ÐиÑÑÑалÑнÑе коÑмÑÑки"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-"ÐÑедмеÑÑ, коÑоÑÑе никак не ÑвÑÐ·Ð°Ð½Ñ Ñ Ñамой
игÑой, но пÑедÑÑавлÑÑÑ ÑенноÑÑÑ "
-"Ð´Ð»Ñ Ð¸Ð³Ñоков из-за ÑабоÑÑ, коÑоÑаÑ
ÑÑебÑеÑÑÑ Ð´Ð»Ñ Ð¸Ñ
полÑÑÐµÐ½Ð¸Ñ (напÑ. "
-"EverQuest); некоÑоÑÑе наÑинаÑÑ ÑобиÑаÑÑ Ð¸Ñ
пÑоÑÑо Ð´Ð»Ñ ÐºÐ¾Ð»Ð»ÐµÐºÑии."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr "СлÑÑайнÑе нагÑадÑ"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-"Ðни пÑевÑаÑаÑÑ Ð¸Ð³ÑÑ Ð² ÑÐºÐ²Ð¸Ð²Ð°Ð»ÐµÐ½Ñ Ð¸Ð³Ñового
авÑомаÑа (напÑ. World of Warcraft, "
-"ZT Online)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr "ÐеÑеменнÑе ÑиклÑ"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-"Ðоведение игÑока можно
“ÑоÑмиÑоваÑÑ” ÑбÑÑÑÑÑÑ Ð¸Ð»Ð¸ замедлÑÑ
ÑÐ¸ÐºÐ»Ñ "
-"(пеÑеÑ
од Ð¾Ñ Ð¾Ð´Ð½Ð¾Ð³Ð¾ ÑÑÐ¾Ð²Ð½Ñ Ðº дÑÑгомÑ),
ÑоÑÑавлÑÑ ÑложнÑе заданиÑ, из коÑоÑÑÑ
"
-"ÑÑÑдно вÑйÑи (напÑ. World of Warcraft) или
ÑооÑвеÑÑÑвенно ÑазделÑÑ Ð¸Ñ
на "
-"неболÑÑие кÑÑки, ÑÑÐ¾Ð±Ñ ÑÑо не надоедало
(напÑ. New Super Mario Bros.Wii)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr "ÐÐ·Ð½Ð¾Ñ Ð¸Ð³Ñового имÑÑеÑÑва"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-"ÐÑо вÑнÑÐ¶Ð´Ð°ÐµÑ Ð¸Ð³Ñоков игÑаÑÑ ÐºÐ°Ð¶Ð´Ñй денÑ,
без вÑÑ
однÑÑ
, пÑоÑÑо Ð´Ð»Ñ Ñого, "
-"ÑÑÐ¾Ð±Ñ Ð½Ðµ поÑеÑÑÑÑ Ñо, ÑÑо они Ñже
заÑабоÑали (напÑ. Farmville, Ultima "
-"Online, Animal Crossing)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-"Ð ÑакиÑ
игÑаÑ
как World of Warcraft, коÑоÑÑе
ÑÑиÑаÑÑÑÑ Ð²ÑзÑваÑÑими ÑилÑнÑÑ "
-"завиÑимоÑÑÑ, пÑименÑеÑÑÑ Ð½ÐµÑколÑко ÑакиÑ
пÑиемов."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-"Ðднако ÑпоÑобноÑÑÑ Ð¸Ð³ÑÑ Ð²ÑзÑваÑÑ
завиÑимоÑÑÑ — ÑолÑко одна из "
-"ÑоÑÑавлÑÑÑиÑ
завиÑимоÑÑи. Ðе менее важнÑ
пÑиÑ
иÑеÑкий облик и обÑÑоÑÑелÑÑÑва "
-"жизни игÑока. ÐавиÑимоÑÑÑ Ð¾Ñ Ð¸Ð³Ñ, как и
дÑÑгие ÑоÑÐ¼Ñ Ð·Ð°Ð²Ð¸ÑимоÑÑи "
-"— ÑÑо ÑоÑма пÑиÑ
иÑеÑкого ÑÑ
ода оÑ
неÑдовлеÑвоÑенноÑÑи жизнÑÑ. Ðак ÑÑо "
-"ни пеÑалÑно, в долгоÑÑоÑной пеÑÑпекÑиве
ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº еÑе Ñ
ÑдÑей жизни."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-"<em>ÐамеÑание</em>. ÐÑ Ð½Ðµ игÑоки. ÐÑли вÑ
дÑмаеÑе, ÑÑо Ð¼Ñ Ñего-Ñо не понÑли, "
-"или Ñ Ð²Ð°Ñ ÐµÑÑÑ Ð¿ÑедложениÑ, коÑоÑÑе
ÑделаÑÑ ÑÑÐ¾Ñ ÑекÑÑ Ð¿Ð¾Ð½ÑÑнее или "
-"пÑавилÑнее, пÑиÑÑлайÑе иÑ
по адÑеÑÑ <<a
href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -578,6 +484,113 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing—and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-"
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Ðногие игÑÑ Ð¿ÑоекÑиÑÑÑÑÑÑ Ñак, ÑÑобÑ
игÑоки пÑинÑждалиÑÑ Ð¿ÑодолжаÑÑ "
+#~ "игÑÑ — и возобновлÑÑÑ ÑвоÑ
подпиÑкÑ. ЧÑÐ¾Ð±Ñ Ð´Ð¾ÑÑиÑÑ ÑÑого, "
+#~ "ÑазÑабоÑÑики полÑзÑÑÑÑÑ <a
href=\"http://www.cracked.com/article_18461_5-"
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">
пÑиемами, "
+#~ "вÑÑекаÑÑими из иÑÑледований Ð¿Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¸
мозга</a>:"
+
+#~ msgid "The Skinner Box"
+#~ msgstr "ЯÑик СкиннеÑа"
+
+#~ msgid ""
+#~ "An environment in which the rat… sorry, the user is trained to "
+#~ "“push the lever“, i.e. do a certain action over and over "
+#~ "again in order to get a reward."
+#~ msgstr ""
+#~ "СÑеда, в коÑоÑой подопÑÑнÑÑ ÐºÑÑÑ...
паÑдон, полÑзоваÑÐµÐ»Ñ Ð¾Ð±ÑÑаÑÑ “"
+#~ "нажимаÑÑ Ð½Ð° ÑÑÑаг”, Ñ.е. вÑполнÑÑÑ
опÑеделенное дейÑÑвие Ñнова и "
+#~ "Ñнова, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ Ð²Ð¾Ð·Ð½Ð°Ð³Ñаждение."
+
+#~ msgid "Virtual food pellets"
+#~ msgstr "ÐиÑÑÑалÑнÑе коÑмÑÑки"
+
+#~ msgid ""
+#~ "Items that have nothing to do with the game itself, but are valuable to "
+#~ "gamers because of the work required to obtain them (e.g., EverQuest); "
+#~ "some people will end up collecting them for the sake of collecting."
+#~ msgstr ""
+#~ "ÐÑедмеÑÑ, коÑоÑÑе никак не ÑвÑÐ·Ð°Ð½Ñ Ñ
Ñамой игÑой, но пÑедÑÑавлÑÑÑ "
+#~ "ÑенноÑÑÑ Ð´Ð»Ñ Ð¸Ð³Ñоков из-за ÑабоÑÑ,
коÑоÑÐ°Ñ ÑÑебÑеÑÑÑ Ð´Ð»Ñ Ð¸Ñ
полÑÑÐµÐ½Ð¸Ñ "
+#~ "(напÑ. EverQuest); некоÑоÑÑе наÑинаÑÑ
ÑобиÑаÑÑ Ð¸Ñ
пÑоÑÑо Ð´Ð»Ñ ÐºÐ¾Ð»Ð»ÐµÐºÑии."
+
+#~ msgid "Random rewards"
+#~ msgstr "СлÑÑайнÑе нагÑадÑ"
+
+#~ msgid ""
+#~ "They turn the game into the equivalent of a slot machine (e.g., World of "
+#~ "Warcraft, ZT Online)."
+#~ msgstr ""
+#~ "Ðни пÑевÑаÑаÑÑ Ð¸Ð³ÑÑ Ð² ÑквиваленÑ
игÑового авÑомаÑа (напÑ. World of "
+#~ "Warcraft, ZT Online)."
+
+#~ msgid "Elaborate cycles"
+#~ msgstr "ÐеÑеменнÑе ÑиклÑ"
+
+#~ msgid ""
+#~ "Gamers' behavior can be “shaped” by making cycles (progress "
+#~ "from one level to the next) slower and slower, designing complex tasks "
+#~ "that are difficult to get out of (e.g. World of Warcraft), or conversely "
+#~ "dividing them up in small chunks to avoid frustration (e.g., New Super "
+#~ "Mario Bros.Wii)."
+#~ msgstr ""
+#~ "Ðоведение игÑока можно
“ÑоÑмиÑоваÑÑ” ÑбÑÑÑÑÑÑ Ð¸Ð»Ð¸ замедлÑÑ "
+#~ "ÑÐ¸ÐºÐ»Ñ (пеÑеÑ
од Ð¾Ñ Ð¾Ð´Ð½Ð¾Ð³Ð¾ ÑÑÐ¾Ð²Ð½Ñ Ðº
дÑÑгомÑ), ÑоÑÑавлÑÑ ÑложнÑе заданиÑ, из "
+#~ "коÑоÑÑÑ
ÑÑÑдно вÑйÑи (напÑ. World of Warcraft)
или ÑооÑвеÑÑÑвенно "
+#~ "ÑазделÑÑ Ð¸Ñ
на неболÑÑие кÑÑки, ÑÑобÑ
ÑÑо не надоедало (напÑ. New Super "
+#~ "Mario Bros.Wii)."
+
+#~ msgid "Decay of game assets"
+#~ msgstr "ÐÐ·Ð½Ð¾Ñ Ð¸Ð³Ñового имÑÑеÑÑва"
+
+#~ msgid ""
+#~ "This makes it necessary for a gamer to keep playing, without vacations, "
+#~ "simply to avoid losing what they have earned so far (e.g., Farmville, "
+#~ "Ultima Online, Animal Crossing)."
+#~ msgstr ""
+#~ "ÐÑо вÑнÑÐ¶Ð´Ð°ÐµÑ Ð¸Ð³Ñоков игÑаÑÑ ÐºÐ°Ð¶Ð´Ñй
денÑ, без вÑÑ
однÑÑ
, пÑоÑÑо Ð´Ð»Ñ Ñого, "
+#~ "ÑÑÐ¾Ð±Ñ Ð½Ðµ поÑеÑÑÑÑ Ñо, ÑÑо они Ñже
заÑабоÑали (напÑ. Farmville, Ultima "
+#~ "Online, Animal Crossing)."
+
+#~ msgid ""
+#~ "Games such as World of Warcraft, which are considered very addictive, use "
+#~ "several of these techniques."
+#~ msgstr ""
+#~ "Ð ÑакиÑ
игÑаÑ
как World of Warcraft, коÑоÑÑе
ÑÑиÑаÑÑÑÑ Ð²ÑзÑваÑÑими "
+#~ "ÑилÑнÑÑ Ð·Ð°Ð²Ð¸ÑимоÑÑÑ, пÑименÑеÑÑÑ
неÑколÑко ÑакиÑ
пÑиемов."
+
+#~ msgid ""
+#~ "However, the addictiveness of a game is only one of the determinants of "
+#~ "addiction. Equally important are the psychological make-up and life "
+#~ "circumstances of the gamer. Gaming addiction, like other addictions, is a "
+#~ "form of mental escape from an unrewarding life. The sad truth is that, in "
+#~ "the long run, it leads to an even worse life."
+#~ msgstr ""
+#~ "Ðднако ÑпоÑобноÑÑÑ Ð¸Ð³ÑÑ Ð²ÑзÑваÑÑ
завиÑимоÑÑÑ — ÑолÑко одна из "
+#~ "ÑоÑÑавлÑÑÑиÑ
завиÑимоÑÑи. Ðе менее
Ð²Ð°Ð¶Ð½Ñ Ð¿ÑиÑ
иÑеÑкий облик и "
+#~ "обÑÑоÑÑелÑÑÑва жизни игÑока.
ÐавиÑимоÑÑÑ Ð¾Ñ Ð¸Ð³Ñ, как и дÑÑгие ÑоÑÐ¼Ñ "
+#~ "завиÑимоÑÑи — ÑÑо ÑоÑма пÑиÑ
иÑеÑкого ÑÑ
ода Ð¾Ñ "
+#~ "неÑдовлеÑвоÑенноÑÑи жизнÑÑ. Ðак ÑÑо ни
пеÑалÑно, в долгоÑÑоÑной "
+#~ "пеÑÑпекÑиве ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº еÑе Ñ
ÑдÑей
жизни."
+
+#~ msgid ""
+#~ "<em>Note:</em> We are not gamers. If you think we have "
+#~ "misunderstood some point, or have suggestions for making this text "
+#~ "clearer or more correct, please send them to <<a href=\"mailto:"
+#~ "address@hidden">address@hidden</a>>."
+#~ msgstr ""
+#~ "<em>ÐамеÑание</em>. ÐÑ Ð½Ðµ игÑоки. ÐÑли вÑ
дÑмаеÑе, ÑÑо Ð¼Ñ Ñего-Ñо не "
+#~ "понÑли, или Ñ Ð²Ð°Ñ ÐµÑÑÑ Ð¿ÑедложениÑ,
коÑоÑÑе ÑделаÑÑ ÑÑÐ¾Ñ ÑекÑÑ Ð¿Ð¾Ð½ÑÑнее "
+#~ "или пÑавилÑнее, пÑиÑÑлайÑе иÑ
по адÑеÑÑ
<<a href=\"mailto:"
+#~ "address@hidden">address@hidden</a>>."
+
+#~ msgid ""
#~ "The Ring (now Amazon) doorbell camera is designed so that the "
#~ "manufacturer (now Amazon) can watch all the time. Now it turns out that "
#~ "<a href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary.zh-tw-diff.html 23 Mar 2019 10:31:42 -0000 1.54
+++ proprietary.zh-tw-diff.html 26 Mar 2019 10:33:49 -0000 1.55
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -128,14 +128,14 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -185,6 +185,28 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201704131">
+ <p>Low-priced Chromebooks for schools are <a
+ href="https://www.eff.org/wp/school-issued-devices-and-student-privacy">
+ collecting far more data on students than is necessary, and store
+ it indefinitely</a>. Parents and students complain about the lack
+ of transparency on the part of both the educational services and the
+ schools, the difficulty of opting out of these services, and the lack
+ of proper privacy policies, among other things.</p>
+
+ <p>But complaining is not sufficient. Parents, students and teachers
+ should realize that the software Google uses to spy on students is
+ nonfree, so they can't verify what it really does. The only remedy is
+ to persuade school officials to <a
href="/education/edu-schools.html">
+ exclusively use free software</a> for both education and school
+ administration. If the school is run locally, parents and teachers
+ can mandate their representatives at the School Board to refuse the
+ budget unless the school initiates a switch to free software. If
+ education is run nation-wide, they need to persuade legislators
+ (e.g., through free software organizations, political parties,
+ etc.) to migrate the public schools to free software.</p>
+ </li>
+
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
@@ -231,56 +253,6 @@
is also deceptive, as it uses confusing menus and complex stats to
obfuscate true monetary costs.</p>
</li>
-
- <li id="M209900000">
- <p id="addictiveness">Many games are designed to
- keep gamers compulsively playing—and renewing
- their subscription. To achieve this result, developers use <a
-
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html">
- techniques that derive from behavioral and brain
research</a>:</p>
-
- <dl class="compact"><dt>The Skinner Box</dt>
- <dd>An environment in which the rat… sorry, the user is
trained
- to “push the lever“, i.e. do a certain action over and
- over again in order to get a reward.</dd>
-
- <dt>Virtual food pellets</dt>
- <dd>Items that have nothing to do with the game itself, but are
- valuable to gamers because of the work required to obtain them
- (e.g., EverQuest); some people will end up collecting them for the
- sake of collecting.</dd>
-
- <dt>Random rewards</dt>
- <dd>They turn the game into the equivalent of a slot machine (e.g.,
- World of Warcraft, ZT Online).</dd>
-
- <dt>Elaborate cycles</dt>
- <dd>Gamers' behavior can be “shaped” by making cycles
- (progress from one level to the next) slower and slower, designing
- complex tasks that are difficult to get out of (e.g. World of
- Warcraft), or conversely dividing them up in small chunks to avoid
- frustration (e.g., New Super Mario Bros.Wii).</dd>
-
- <dt>Decay of game assets</dt>
- <dd>This makes it necessary for a gamer to keep playing, without
- vacations, simply to avoid losing what they have earned so far
- (e.g., Farmville, Ultima Online, Animal Crossing).</dd>
- </dl>
-
- <p>Games such as World of Warcraft, which are considered very
addictive,
- use several of these techniques.</p>
-
- <p>However, the addictiveness of a game is only one of the
determinants
- of addiction. Equally important are the psychological make-up and life
- circumstances of the gamer. Gaming addiction, like other addictions,
- is a form of mental escape from an unrewarding life. The sad truth
- is that, in the long run, it leads to an even worse life.</p>
-
- <p><em>Note:</em> We are not gamers. If you think
we
- have misunderstood some point, or have suggestions for making
- this text clearer or more correct, please send them to <<a
- href="mailto:address@hidden">address@hidden</a>>.</p>
- </li>
</ul></em></ins></span>
@@ -341,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:42 $
+$Date: 2019/03/26 10:33:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.zh-tw.po 23 Mar 2019 10:31:42 -0000 1.65
+++ proprietary.zh-tw.po 26 Mar 2019 10:33:49 -0000 1.66
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-"
"oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
"after breaking into the computer they are connected to."
@@ -395,94 +419,6 @@
"stats to obfuscate true monetary costs."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing—and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-"
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat… sorry, the user is trained to “"
-"push the lever“, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be “shaped” by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em> We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to <<a href=\"mailto:address@hidden"
-"\">address@hidden</a>>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- pt-br.po 23 Mar 2019 12:33:20 -0000 1.69
+++ pt-br.po 26 Mar 2019 10:33:49 -0000 1.70
@@ -3251,6 +3251,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- ru.po 23 Mar 2019 18:01:24 -0000 1.120
+++ ru.po 26 Mar 2019 10:33:49 -0000 1.121
@@ -4380,6 +4380,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- zh-tw.po 23 Mar 2019 10:31:42 -0000 1.52
+++ zh-tw.po 26 Mar 2019 10:33:49 -0000 1.53
@@ -3066,6 +3066,30 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/"
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google's new voice messaging app <a href=\"http://www.theverge."
"com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
"conversations</a>."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/30